Static task
static1
Behavioral task
behavioral1
Sample
6f2f56a9b9eafe308ead34e065201752715ef6fe3f35522da1e65805af9b103f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6f2f56a9b9eafe308ead34e065201752715ef6fe3f35522da1e65805af9b103f.exe
Resource
win10v2004-20220901-en
General
-
Target
6f2f56a9b9eafe308ead34e065201752715ef6fe3f35522da1e65805af9b103f
-
Size
256KB
-
MD5
4cdd6fd6a46a2214e36d9b4141caf463
-
SHA1
c66d7aaa99613f79503c0f05dbaaad36ab832789
-
SHA256
6f2f56a9b9eafe308ead34e065201752715ef6fe3f35522da1e65805af9b103f
-
SHA512
67a0dcb41a6f5a0330e27bf6106939e59b1c5257c66c78daab71ae0cae57e5623b9a76547854fa7c36398431a9f60a982bb8a5c1b049602c64fbd48c515e7c69
-
SSDEEP
6144:VU1x7EiXbFPgbQck35q737IEf3dhGAUxhlOo:VUvZbFPgbI5a93dhip
Malware Config
Signatures
Files
-
6f2f56a9b9eafe308ead34e065201752715ef6fe3f35522da1e65805af9b103f.exe windows x86
44ddbbe6230ea75d4641465cfa7a5242
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetFileAttributesA
ReadFile
HeapAlloc
UnmapViewOfFile
FlushViewOfFile
SetFilePointer
LocalFree
LocalUnlock
WriteProcessMemory
GetProcAddress
LoadLibraryA
ReadProcessMemory
GetCurrentProcess
LocalLock
LocalAlloc
HeapFree
CreateDirectoryA
DeleteFileA
GetFileAttributesA
FindNextFileA
Sleep
FindFirstFileA
GetLogicalDrives
SetEndOfFile
CreateFileA
GetLastError
Process32Next
Process32First
CreateToolhelp32Snapshot
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
RtlUnwind
VirtualAlloc
HeapReAlloc
IsBadWritePtr
GetCPInfo
GetACP
GetOEMCP
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetFileSize
CreateFileMappingA
MapViewOfFile
WriteFile
CloseHandle
GetVersionExA
GetProcessHeap
GetSystemDirectoryA
GetWindowsDirectoryA
CreateThread
GetModuleFileNameA
CreateFileW
GetWindowsDirectoryW
GlobalLock
GlobalAlloc
Process32NextW
OpenProcess
GetExitCodeProcess
Process32FirstW
GetDriveTypeA
FindNextFileW
FindFirstFileW
DeleteFileW
SetFileAttributesW
advapi32
RegisterServiceCtrlHandlerA
ChangeServiceConfigA
StartServiceA
CreateServiceA
OpenServiceA
QueryServiceStatus
SetServiceStatus
RegCreateKeyExA
RegSetValueExA
RegCloseKey
QueryServiceConfigA
AdjustTokenPrivileges
LookupPrivilegeValueA
CloseServiceHandle
OpenSCManagerA
StartServiceCtrlDispatcherA
RegDeleteValueA
OpenProcessToken
shell32
ShellExecuteA
ws2_32
WSAStartup
closesocket
send
sendto
ntohl
htons
htonl
inet_addr
socket
accept
connect
recvfrom
__WSAFDIsSet
select
recv
listen
bind
user32
ExitWindowsEx
Sections
.text Size: 116KB - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 24KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 100KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE