Static task
static1
Behavioral task
behavioral1
Sample
a66cd08c1c7f796713b1c6c0d54df2d31d8612f2a339b2255ff5242cc10f3d5b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a66cd08c1c7f796713b1c6c0d54df2d31d8612f2a339b2255ff5242cc10f3d5b.exe
Resource
win10v2004-20220901-en
General
-
Target
a66cd08c1c7f796713b1c6c0d54df2d31d8612f2a339b2255ff5242cc10f3d5b
-
Size
112KB
-
MD5
6cf7ba8fe1f216def0659128b17b5a40
-
SHA1
e8517feba3656e018556c7c47d4b3c87a0dc1c67
-
SHA256
a66cd08c1c7f796713b1c6c0d54df2d31d8612f2a339b2255ff5242cc10f3d5b
-
SHA512
b16d068ed5fac14b33c6e71a1f3ba9e8cfd585d7f02906dd30f01a13949500e85a1c8b09d31a6dbf9ed37cf816992ae1cd9b2c6a214bd75b5cbd09fe6830b9ae
-
SSDEEP
3072:RT16ckkgS48jlcSU/99gvUtovWv9ftzjvR/gnFVtt:r6cPgS4hF/99ZtovYlzN/gnFVj
Malware Config
Signatures
Files
-
a66cd08c1c7f796713b1c6c0d54df2d31d8612f2a339b2255ff5242cc10f3d5b.exe windows x86
f61f591e6abc7dd09375fd35a1a69d93
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
opengl32
glTexCoord4dv
glViewport
glLoadMatrixf
glFogiv
glAreTexturesResident
glColor4sv
glGetMaterialfv
glColor3f
glColor3sv
glMap2f
glPushMatrix
glNormal3s
glTexCoord4fv
user32
TranslateMessage
LoadCursorA
LoadIconA
GetClipboardData
oledlg
ord3
ord4
ord9
ord5
ord8
ord12
ord11
ord2
ord10
ord7
ord1
ord6
comctl32
FlatSB_SetScrollInfo
ord16
ord15
FlatSB_SetScrollProp
DestroyPropertySheetPage
PropertySheetW
FlatSB_SetScrollPos
PropertySheetA
ord3
FlatSB_GetScrollProp
kernel32
MultiByteToWideChar
LCMapStringW
GetSystemTimeAsFileTime
HeapCreate
DeleteCriticalSection
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameW
GetConsoleMode
GetConsoleCP
WideCharToMultiByte
HeapFree
WriteConsoleW
SetFilePointer
RtlUnwind
GetCurrencyFormatA
VirtualFree
GetSystemDefaultLangID
OpenEventA
ResetEvent
GetSystemDefaultLCID
IsBadCodePtr
CreateMutexA
GetModuleHandleA
GetProcAddress
VirtualAllocEx
SetHandleInformation
GetCommandLineA
LocalLock
CreateSemaphoreA
QueryPerformanceCounter
GetModuleFileNameA
GetStdHandle
CopyFileA
DeleteFileA
GetCurrentProcessId
GetACP
GetEnvironmentVariableA
GetEnvironmentStrings
GetTickCount
GetProcessHeap
GetComputerNameA
TlsGetValue
SuspendThread
ReleaseMutex
GetCurrentThreadId
LCMapStringA
CloseHandle
Sleep
SetEvent
LocalReAlloc
GetVersion
ResumeThread
FreeEnvironmentStringsA
ExitProcess
LocalHandle
GetModuleHandleW
HeapSize
OpenMutexA
LoadLibraryW
IsProcessorFeaturePresent
WriteFile
GetFileType
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
EnterCriticalSection
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetLastError
SetLastError
TlsFree
DecodePointer
HeapAlloc
HeapReAlloc
CreateFileW
OpenSemaphoreA
LocalFree
GetStringTypeW
HeapSetInformation
GetStartupInfoW
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetOEMCP
IsValidCodePage
EncodePointer
TlsAlloc
TlsSetValue
aclui
ord2
ord1
ws2_32
htonl
gethostname
listen
getsockopt
bind
htons
getprotobyname
inet_addr
getprotobynumber
socket
ioctlsocket
recv
getservbyname
accept
connect
cryptui
CryptUIWizDigitalSign
CryptUIDlgViewContext
CryptUIWizExport
CryptUIWizImport
Sections
.hjhjse Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.grth Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE