Static task
static1
Behavioral task
behavioral1
Sample
6b99ca40cc54d48daea0ca6eb89bbb4519357d32fb6ddda0003fa5f91cea4a28.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6b99ca40cc54d48daea0ca6eb89bbb4519357d32fb6ddda0003fa5f91cea4a28.exe
Resource
win10v2004-20220812-en
General
-
Target
6b99ca40cc54d48daea0ca6eb89bbb4519357d32fb6ddda0003fa5f91cea4a28
-
Size
334KB
-
MD5
66d457c56498eaebeb74874277c6c020
-
SHA1
f9dcac9eaa4bf5d3f8d072b26e0a675bff35b59f
-
SHA256
6b99ca40cc54d48daea0ca6eb89bbb4519357d32fb6ddda0003fa5f91cea4a28
-
SHA512
1b08cbe27f0983f9c3c6dce82c6febac30b7c947a119dbf9222ae8f1d83f3197aaef565c028d941263d242ead45790a4b12e247b118e846b23fe84824f8cdedd
-
SSDEEP
6144:g7vh0BemD+UYWA7o3Dfxpbk+J4F70E6f3:HBey+DX0TjY+JK7f6f3
Malware Config
Signatures
Files
-
6b99ca40cc54d48daea0ca6eb89bbb4519357d32fb6ddda0003fa5f91cea4a28.exe windows x86
b0b79e0c229291725640fde7988954a7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GetModuleHandleA
FindClose
CloseHandle
GetFullPathNameW
CreateFileA
FindFirstFileA
InterlockedIncrement
InterlockedDecrement
InterlockedCompareExchange
LockResource
VirtualProtect
LoadResource
GetProcessHeap
GetModuleHandleW
FindResourceW
GetTempPathA
CreateFileW
GetVersionExW
GetLastError
GetFileSize
MapViewOfFile
DeleteFileA
MoveFileExA
GetProcAddress
VirtualAlloc
VirtualFree
HeapFree
HeapAlloc
FreeLibrary
GetTickCount
SizeofResource
Sleep
SetEndOfFile
WriteConsoleW
FlushFileBuffers
SetStdHandle
SetFilePointerEx
GetConsoleCP
LoadLibraryW
LoadLibraryExW
OutputDebugStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
GetFileType
SetFilePointer
ReadConsoleW
GetConsoleMode
ReadFile
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
RtlUnwind
GetSystemTimeAsFileTime
RaiseException
HeapReAlloc
GetCommandLineW
InitializeCriticalSectionAndSpinCount
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
IsProcessorFeaturePresent
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetStdHandle
WriteFile
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
AreFileApisANSI
HeapSize
GetCurrentThreadId
IsDebuggerPresent
IsValidCodePage
GetACP
GetOEMCP
VirtualQuery
gdi32
SelectObject
DeleteDC
CreateCompatibleDC
CreateBitmap
GetObjectW
user32
MessageBoxW
DestroyWindow
GetMonitorInfoW
MonitorFromPoint
LoadCursorW
GetDesktopWindow
GetWindowRect
ReleaseDC
GetDC
UpdateWindow
SetTimer
UpdateLayeredWindow
ShowWindow
CreateWindowExW
RegisterClassW
DefWindowProcW
PeekMessageW
DispatchMessageW
TranslateMessage
Sections
.text Size: 226KB - Virtual size: 225KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ