Static task
static1
Behavioral task
behavioral1
Sample
6d0359864f43d97feec4494c5a3c6b4c594c1c74efe068d6f59f43279e83e58b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6d0359864f43d97feec4494c5a3c6b4c594c1c74efe068d6f59f43279e83e58b.exe
Resource
win10v2004-20220812-en
General
-
Target
6d0359864f43d97feec4494c5a3c6b4c594c1c74efe068d6f59f43279e83e58b
-
Size
556KB
-
MD5
14ed570019bd50b8933b8b73dee7a9bf
-
SHA1
97a4a14b659b18ac3b0c7d3007f4707278d62a4e
-
SHA256
6d0359864f43d97feec4494c5a3c6b4c594c1c74efe068d6f59f43279e83e58b
-
SHA512
c3a50c5bd41a6cdaeefef086bfe6a49d272ad873b040f42b7438780d45ec8d1a1bbe93a5d126cba099e563a0dd6e8af3f18d81cb0db8f4b13b802715c9c1e619
-
SSDEEP
12288:uEh6UkHsJUA3CKE5LzhcvQdMGXjkrpWBHps8UX:jh6yJUA3C15Lzhcv6M+DH18
Malware Config
Signatures
Files
-
6d0359864f43d97feec4494c5a3c6b4c594c1c74efe068d6f59f43279e83e58b.exe windows x86
60849ccf22c85c2f1c1b275eee5d0525
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegQueryValueExA
RegDeleteKeyW
OpenProcessToken
RegOpenKeyA
RegCreateKeyExA
ControlService
RegCloseKey
GetTokenInformation
kernel32
Sleep
HeapFree
InterlockedIncrement
GetUserDefaultLCID
HeapSize
GetTimeZoneInformation
EnterCriticalSection
IsValidCodePage
IsDebuggerPresent
SetConsoleCtrlHandler
RtlUnwind
CompareStringA
UnhandledExceptionFilter
GetCurrentThreadId
GetModuleFileNameW
CloseHandle
HeapReAlloc
GetCommandLineW
GetModuleFileNameA
GetCurrentProcessId
GetCurrentProcess
GetConsoleOutputCP
CreateMutexW
TlsSetValue
GetCommandLineA
TerminateProcess
SetLastError
GetSystemTimeAsFileTime
CompareStringW
SetStdHandle
GetStringTypeW
TlsAlloc
GetLastError
LCMapStringW
InterlockedDecrement
GetStartupInfoW
GetStdHandle
FreeLibrary
FreeEnvironmentStringsW
ExitProcess
SetHandleCount
WriteConsoleA
GetFileType
InterlockedExchange
GetConsoleCP
GetVersionExA
HeapAlloc
GetLocaleInfoW
ReadFile
GetCurrentThread
GetModuleHandleW
VirtualQuery
GetEnvironmentStrings
RaiseException
TlsGetValue
WriteConsoleW
InitializeCriticalSection
GetModuleHandleA
GetLocaleInfoA
MultiByteToWideChar
GetTickCount
LeaveCriticalSection
GetOEMCP
SetUnhandledExceptionFilter
LoadLibraryA
IsValidLocale
GetConsoleMode
GetStartupInfoA
WriteFile
GetStringTypeA
FreeEnvironmentStringsA
HeapDestroy
GetTimeFormatA
FatalAppExitA
GetDateFormatA
SetFilePointer
VirtualAlloc
GetEnvironmentStringsW
GetACP
TlsFree
HeapCreate
GetProcAddress
QueryPerformanceCounter
CreateFileA
FlushFileBuffers
SetEnvironmentVariableA
GetCPInfo
WideCharToMultiByte
VirtualFree
DeleteCriticalSection
GetProcessHeap
LCMapStringA
user32
DeferWindowPos
GetClipboardData
GetClientRect
ShowWindow
SetWindowPos
FillRect
LockWindowUpdate
CreatePopupMenu
GetWindowDC
UnhookWindowsHookEx
GetPropW
IsWindowVisible
GetMenuItemID
GetCapture
DefWindowProcW
CharUpperW
GetCursorPos
UnregisterClassA
GetIconInfo
SetMenuDefaultItem
SetParent
TranslateMessage
GetSubMenu
GetMenuStringW
SetForegroundWindow
MapDialogRect
RegisterClipboardFormatW
DrawStateW
LoadMenuW
RemovePropW
DestroyWindow
GetWindowLongW
MessageBoxW
IsWindowEnabled
CreateWindowExW
WinHelpW
GetTopWindow
IsWindow
GetWindowTextLengthW
SetClipboardData
EndDialog
DestroyIcon
CopyRect
EnableWindow
DestroyMenu
GetMenu
ReleaseDC
SetCapture
IsZoomed
SetDlgItemInt
SendDlgItemMessageW
SetTimer
DrawFocusRect
GetScrollInfo
GetClassLongW
DrawTextExW
GetAsyncKeyState
GetDesktopWindow
SetActiveWindow
CopyImage
GetKeyState
TrackPopupMenuEx
ReleaseCapture
SetPropW
BeginPaint
IsIconic
KillTimer
EndDeferWindowPos
GetSystemMetrics
MessageBeep
GetFocus
GetActiveWindow
GetMessageTime
GetMenuDefaultItem
IsChild
ScreenToClient
GetSysColorBrush
SetRect
GetWindowThreadProcessId
GetWindowPlacement
BeginDeferWindowPos
DrawEdge
MoveWindow
MapWindowPoints
PostMessageW
RedrawWindow
GetMenuCheckMarkDimensions
OffsetRect
GetSystemMenu
ClientToScreen
GetParent
SetWindowRgn
PostQuitMessage
RegisterClassExW
AppendMenuW
InvalidateRect
GetDlgCtrlID
CheckMenuItem
EqualRect
DispatchMessageW
GetWindowRect
GetDlgItem
EndPaint
RegisterClassW
EmptyClipboard
RegisterWindowMessageW
GetMenuItemCount
shell32
SHFileOperationA
SHGetMalloc
DragQueryFileA
Sections
.text Size: 124KB - Virtual size: 122KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256KB - Virtual size: 252KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 72KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 100KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ