Static task
static1
Behavioral task
behavioral1
Sample
6f692f0a2602bdb7786c60a5dde62f48dcef114acb6130dab2d619672691fb83.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6f692f0a2602bdb7786c60a5dde62f48dcef114acb6130dab2d619672691fb83.exe
Resource
win10v2004-20220812-en
General
-
Target
6f692f0a2602bdb7786c60a5dde62f48dcef114acb6130dab2d619672691fb83
-
Size
245KB
-
MD5
6c30ef8c03f48ab31a6436ab840d4a50
-
SHA1
c241d90bba9605f6142bdaf0797cd600aca15e97
-
SHA256
6f692f0a2602bdb7786c60a5dde62f48dcef114acb6130dab2d619672691fb83
-
SHA512
6a4acb6c68df4b13ba82999e696748d3b45ef69959ca1b3fc3acae3aecc0578142d45ebc194cd8408953c1f9c30b26df81dce98f4af8ae30bf7c9887748aa436
-
SSDEEP
6144:dgZJ3V8jdV7pfaCOSckpI4nHJhQwLPor8g:dM5GHUwrA
Malware Config
Signatures
Files
-
6f692f0a2602bdb7786c60a5dde62f48dcef114acb6130dab2d619672691fb83.exe windows x86
49a3412c1cb0d18b78118656f471937c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
OleUninitialize
OleInitialize
user32
RegisterClassExA
CreateWindowExA
GetWindowLongA
DefWindowProcA
SetWindowLongA
GetClassInfoExA
SendMessageA
RegisterWindowMessageA
DestroyWindow
FindWindowA
UnregisterClassA
GetSystemMetrics
CharNextA
ReleaseDC
GetDC
msvcr71
__dllonexit
_putenv
printf
??3@YAXPAX@Z
strrchr
strncpy
malloc
free
memset
memmove
realloc
sprintf
_vsnprintf
??2@YAPAXI@Z
strstr
strtol
getenv
atoi
_mbctype
_stricmp
vsprintf
asctime
gmtime
time
__security_error_handler
_except_handler3
_CxxThrowException
?terminate@@YAXXZ
_controlfp
_onexit
??1type_info@@UAE@XZ
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_amsg_exit
_acmdln
exit
_cexit
_ismbblead
_XcptFilter
_exit
_c_exit
wcslen
__CxxFrameHandler
_purecall
kernel32
GetCurrentProcess
GetCurrentThreadId
CreateThread
TerminateThread
SetUnhandledExceptionFilter
IsBadReadPtr
VirtualProtect
IsBadWritePtr
GetCurrentDirectoryA
SetCurrentDirectoryA
SetFilePointer
FindResourceExA
FindResourceA
LoadResource
LockResource
SizeofResource
GetCurrentProcessId
GetTickCount
MoveFileA
CreateDirectoryA
GetFileAttributesA
CreateFileA
DeleteFileA
VirtualQuery
FreeLibrary
InterlockedDecrement
InterlockedIncrement
OpenProcess
GlobalMemoryStatus
SetEnvironmentVariableA
WriteFile
GetEnvironmentVariableA
WideCharToMultiByte
RaiseException
GetLastError
InitializeCriticalSection
DeleteCriticalSection
GetProcAddress
GetModuleHandleA
LocalFree
GetCommandLineW
ReleaseMutex
CloseHandle
WaitForSingleObject
CreateMutexA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetStartupInfoA
GetVersionExA
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
EnterCriticalSection
LeaveCriticalSection
ExitProcess
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetModuleFileNameA
GetThreadContext
LoadLibraryA
SetErrorMode
shell32
SHGetFolderPathA
CommandLineToArgvW
advapi32
ConvertStringSecurityDescriptorToSecurityDescriptorA
SetFileSecurityA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
shlwapi
PathAppendA
PathAddBackslashA
PathStripToRootA
version
GetFileVersionInfoA
VerQueryValueA
gdi32
GetDeviceCaps
Sections
.text Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 172KB - Virtual size: 172KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE