Static task
static1
Behavioral task
behavioral1
Sample
6e08b99e421c56e6afaacbe59f9b54a950b1548e3a2392a35aff049f04736584.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
6e08b99e421c56e6afaacbe59f9b54a950b1548e3a2392a35aff049f04736584.exe
Resource
win10v2004-20220901-en
General
-
Target
6e08b99e421c56e6afaacbe59f9b54a950b1548e3a2392a35aff049f04736584
-
Size
1.1MB
-
MD5
17148454058c4108649909bec64ac720
-
SHA1
c34b8f3327d5ed30a896c54a91808681f784fc2e
-
SHA256
6e08b99e421c56e6afaacbe59f9b54a950b1548e3a2392a35aff049f04736584
-
SHA512
827973077f93a32c64f64db55d274324584029c0ce2137806e67efc59824fcf29c4cd3b069941f537967fdd23ee536837167e3e854837cf9e5029424177d6b18
-
SSDEEP
24576:zBjPH7AJldZwElkXOd/yjPgu5F4J1fNjGU/MnZzNIL5sf:N7H07duE4OdrG4xGRZziL5
Malware Config
Signatures
Files
-
6e08b99e421c56e6afaacbe59f9b54a950b1548e3a2392a35aff049f04736584.exe windows x86
052db2c45a89e808d566f853dbe2ce3e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineA
GetLastError
SetLastError
GetCurrentThreadId
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
GetProcAddress
MultiByteToWideChar
WideCharToMultiByte
GetProcessHeap
GetStdHandle
GetFileType
DeleteCriticalSection
GetStartupInfoW
GetModuleFileNameA
WriteFile
GetModuleFileNameW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
EnterCriticalSection
LeaveCriticalSection
HeapFree
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
IsDebuggerPresent
IsProcessorFeaturePresent
LoadLibraryExW
RtlUnwind
OutputDebugStringW
HeapAlloc
HeapReAlloc
GetStringTypeW
HeapSize
LCMapStringW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetStdHandle
SetFilePointerEx
WriteConsoleW
CloseHandle
CreateFileW
ReadFile
SetFilePointer
CreateFileMappingW
GetTempFileNameW
FindResourceExW
FindResourceW
LoadResource
VerSetConditionMask
CreateDirectoryW
CopyFileW
SizeofResource
FormatMessageW
HeapDestroy
GetTempPathW
RaiseException
VerifyVersionInfoW
LockResource
RemoveDirectoryW
lstrcmpiW
DeleteFileW
LocalFree
CreateProcessW
WaitForSingleObject
GetExitCodeProcess
MapViewOfFile
UnmapViewOfFile
VirtualQuery
shlwapi
PathAppendW
PathQuoteSpacesW
ole32
CoInitializeEx
CoUninitialize
shell32
SHGetFolderPathW
ord680
user32
CharNextA
wvsprintfW
MessageBoxW
CharLowerBuffW
Sections
.text Size: 73KB - Virtual size: 73KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 788KB - Virtual size: 788KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 240KB - Virtual size: 400KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ