Static task
static1
Behavioral task
behavioral1
Sample
a6fe82ef7eba943f1eacab10e99a014b10678c83766cd1de0b3de2e420d4eed3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a6fe82ef7eba943f1eacab10e99a014b10678c83766cd1de0b3de2e420d4eed3.exe
Resource
win10v2004-20220812-en
General
-
Target
a6fe82ef7eba943f1eacab10e99a014b10678c83766cd1de0b3de2e420d4eed3
-
Size
732KB
-
MD5
1508de4daed765f776bd9222e0e0b97f
-
SHA1
10f14044463e7a6780b46992fc269b0f5e0868fa
-
SHA256
a6fe82ef7eba943f1eacab10e99a014b10678c83766cd1de0b3de2e420d4eed3
-
SHA512
891ff27144ba2a6b3455e85ac6139e64f8732cc655533683aefa979c6b0681536c2345feced4d91b60c54a4450c1f3899af49912f9897a71f80a57eb71cb681d
-
SSDEEP
12288:+G6t15i/eL5OvbattUL9bcgljC1k7iSuHri+G1rUh0yN86xjcS6arz:T6tiwOvbatylcgzi3ri+QUlFKar
Malware Config
Signatures
Files
-
a6fe82ef7eba943f1eacab10e99a014b10678c83766cd1de0b3de2e420d4eed3.exe windows x86
3b3a4998a265d2469ce1775f3f615150
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
_TrackMouseEvent
ImageList_GetImageInfo
CreateStatusWindowW
ImageList_Create
ImageList_AddMasked
ImageList_Destroy
ImageList_ReplaceIcon
ImageList_EndDrag
InitCommonControlsEx
ord17
DestroyPropertySheetPage
ImageList_GetIcon
ImageList_DragLeave
ImageList_BeginDrag
ImageList_DragMove
ImageList_Add
ImageList_Draw
ImageList_GetImageCount
ImageList_GetIconSize
ImageList_DragEnter
shell32
SHGetSpecialFolderPathA
SHFileOperationA
wsock32
WSACleanup
user32
SetFocus
LoadIconW
RemovePropW
GetDlgItem
GetWindowTextW
GetNextDlgTabItem
GetSysColor
GetWindowThreadProcessId
GetDesktopWindow
GetMenuItemCount
BeginDeferWindowPos
SetPropW
MapWindowPoints
SendDlgItemMessageW
SetClipboardData
EndPaint
EnableMenuItem
InvalidateRect
BeginPaint
CloseClipboard
EndDialog
GetMenuItemInfoW
CopyRect
GetWindow
GetCapture
GetPropW
GetParent
GetCursorPos
GetClassInfoExW
FrameRect
EndDeferWindowPos
RegisterClassW
SetCursorPos
DeleteMenu
GetFocus
ReleaseDC
LoadBitmapW
RedrawWindow
LoadCursorW
ShowWindow
DefWindowProcW
PeekMessageW
SendMessageW
IsZoomed
DispatchMessageW
GetClientRect
LoadAcceleratorsW
DrawIconEx
GetWindowDC
PostMessageW
DestroyMenu
LoadMenuW
DestroyWindow
DrawMenuBar
GetSubMenu
DestroyAcceleratorTable
TrackPopupMenuEx
IntersectRect
GetWindowLongW
DestroyIcon
IsWindow
GetKeyState
CharUpperW
SetRect
GetUpdateRect
MessageBoxW
CreateWindowExW
RegisterClassExW
SetMenu
kernel32
GetCurrentDirectoryW
GetFileType
GetCurrentDirectoryA
lstrlenW
HeapDestroy
FlushFileBuffers
GlobalFlags
HeapReAlloc
lstrcpynA
lstrlenA
CreateDirectoryW
ReadFile
GetCommandLineW
CreateFileW
GetEnvironmentStringsW
LoadLibraryW
SetEndOfFile
GetTickCount
lstrcmpW
IsDebuggerPresent
FindNextFileW
UnhandledExceptionFilter
LocalFileTimeToFileTime
GetVersion
ResetEvent
OutputDebugStringA
GetTimeZoneInformation
DuplicateHandle
VirtualFree
CompareStringW
GetModuleFileNameA
InterlockedIncrement
TlsSetValue
GetTimeFormatA
FreeEnvironmentStringsW
CopyFileW
DeviceIoControl
GlobalDeleteAtom
SuspendThread
SystemTimeToFileTime
QueryPerformanceCounter
GetVersionExW
GlobalLock
RaiseException
GetFileTime
FindClose
LCMapStringW
CompareStringA
FileTimeToLocalFileTime
LoadResource
GetSystemInfo
IsBadReadPtr
FreeLibrary
LocalFree
CompareFileTime
IsBadWritePtr
GetProcAddress
TlsFree
IsValidLocale
GetFileAttributesW
SizeofResource
UnmapViewOfFile
SetFilePointer
UnlockFile
InterlockedCompareExchange
GetCurrentThreadId
LCMapStringA
SetStdHandle
FindNextFileA
GetCurrentProcessId
GlobalSize
GetStartupInfoW
SetHandleCount
SetEnvironmentVariableA
lstrcpyW
WinExec
GetUserDefaultLangID
ConvertDefaultLocale
GetCurrentProcess
GetExitCodeProcess
GetVersionExA
CreateMutexW
SetFileAttributesW
SetUnhandledExceptionFilter
LeaveCriticalSection
GetSystemTimeAsFileTime
MapViewOfFile
CreateProcessA
LocalReAlloc
GetEnvironmentStrings
LocalAlloc
DeleteFileW
InterlockedDecrement
TerminateProcess
lstrcmpiW
VirtualAlloc
GetTempFileNameW
LoadLibraryA
CopyFileA
GetTempPathA
GetCurrentThread
GetDateFormatA
GetFullPathNameW
FindFirstFileW
TlsGetValue
GetFullPathNameA
GetLocaleInfoW
HeapSize
GetModuleHandleW
FormatMessageA
lstrcpyA
FreeResource
SetLastError
lstrcmpiA
CreateDirectoryA
GetModuleHandleA
GetStartupInfoA
DeleteFileA
GetFileSize
GetCPInfo
GetModuleFileNameW
WriteConsoleA
FindFirstFileA
GlobalMemoryStatus
GetACP
GetStringTypeW
VirtualQuery
FormatMessageW
lstrcpynW
GetLocaleInfoA
GetLocalTime
GetExitCodeThread
FileTimeToSystemTime
InterlockedExchange
CreateMutexA
InitializeCriticalSection
GlobalUnlock
MulDiv
GetLastError
GetCommandLineA
GetProcessHeap
lstrcmpA
HeapAlloc
RtlUnwind
CreateThread
GetSystemTime
CreateFileA
HeapFree
GlobalReAlloc
HeapCreate
GlobalAlloc
TerminateThread
LockResource
OpenProcess
GetFileAttributesA
ResumeThread
ReleaseMutex
WriteFile
MultiByteToWideChar
GetStdHandle
WaitForSingleObject
SetFileTime
GetOEMCP
ExpandEnvironmentStringsA
WaitForMultipleObjects
FreeEnvironmentStringsA
GetUserDefaultLCID
GetSystemDirectoryA
GlobalHandle
GetTempPathW
WideCharToMultiByte
CloseHandle
SetThreadPriority
EnterCriticalSection
IsBadCodePtr
VirtualProtect
GetThreadLocale
Sleep
GetDriveTypeA
CreateEventW
ExitProcess
ExitThread
GlobalFree
DeleteCriticalSection
TlsAlloc
GetStringTypeA
LockFile
SetErrorMode
SetEvent
shlwapi
PathAppendA
PathIsUNCA
PathStripToRootA
PathFindExtensionA
PathRemoveFileSpecA
PathFileExistsA
PathFindFileNameA
Sections
.text Size: 85KB - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 472KB - Virtual size: 471KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 103KB - Virtual size: 121KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 71KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ