Static task
static1
Behavioral task
behavioral1
Sample
6f59e0683db86114ac31fbf2513ef1ce9ef8cd6f6ec6c4e4da2c206c95b94c53.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6f59e0683db86114ac31fbf2513ef1ce9ef8cd6f6ec6c4e4da2c206c95b94c53.exe
Resource
win10v2004-20220812-en
General
-
Target
6f59e0683db86114ac31fbf2513ef1ce9ef8cd6f6ec6c4e4da2c206c95b94c53
-
Size
356KB
-
MD5
6204f4d5380190ca8e6ec743cc4a5510
-
SHA1
520389f940aa22bfa086dc73ba5bdd501296c492
-
SHA256
6f59e0683db86114ac31fbf2513ef1ce9ef8cd6f6ec6c4e4da2c206c95b94c53
-
SHA512
19a8fd5a0c89b6b85dc8b0a966907c0e95acab99c5eda5da49d34b6118cf9540ff97a4b74dd592143b879bda15fc544a80477e48673186010f3e07d51293e5d8
-
SSDEEP
6144:56Fe/r9487uA4nsQ8qvwnfKoBGTKYQqpILtAO/2qqDLuu+nEMZQMYksU3:Ie/r9SbOf5BGT39KLtNqnuLZbYkP3
Malware Config
Signatures
Files
-
6f59e0683db86114ac31fbf2513ef1ce9ef8cd6f6ec6c4e4da2c206c95b94c53.exe windows x86
abf23a595513e6d200ee5f832a3d4227
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CharUpperA
CharLowerA
kernel32
CreateThread
QueryPerformanceCounter
QueryPerformanceFrequency
CloseHandle
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetTickCount
GetProcAddress
LoadLibraryA
FreeLibrary
SetConsoleMode
GetStdHandle
SetConsoleCursorPosition
FillConsoleOutputAttribute
FillConsoleOutputCharacterA
GetConsoleScreenBufferInfo
SetConsoleTextAttribute
SetConsoleWindowInfo
SetConsoleScreenBufferSize
AllocConsole
GetEnvironmentVariableA
SetLocalTime
GetLocalTime
OutputDebugStringA
GetConsoleMode
ReadConsoleInputA
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetSystemInfo
VirtualProtect
SetEndOfFile
SetStdHandle
IsBadCodePtr
IsBadReadPtr
GetOEMCP
GetACP
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
GetCPInfo
LCMapStringW
MultiByteToWideChar
LCMapStringA
VirtualQuery
HeapAlloc
HeapFree
HeapReAlloc
RtlUnwind
GetLastError
DeleteFileA
ExitThread
GetCurrentThreadId
ExitProcess
GetModuleHandleA
TerminateProcess
GetCurrentProcess
GetSystemTimeAsFileTime
RaiseException
GetCommandLineA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
TlsAlloc
SetLastError
TlsFree
TlsSetValue
TlsGetValue
ReadFile
SetHandleCount
GetFileType
GetStartupInfoA
SetFilePointer
WriteFile
HeapSize
UnhandledExceptionFilter
FlushFileBuffers
GetCurrentProcessId
GetFileAttributesA
CreateFileA
WideCharToMultiByte
GetTimeZoneInformation
SetUnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
InterlockedExchange
wsock32
getsockname
gethostname
sendto
WSAGetLastError
recvfrom
gethostbyname
socket
setsockopt
inet_ntoa
bind
htons
WSACleanup
WSAStartup
closesocket
ioctlsocket
inet_addr
htonl
ntohs
winmm
timeGetTime
timeBeginPeriod
Sections
.text Size: 216KB - Virtual size: 212KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 24KB - Virtual size: 155KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE