Static task
static1
Behavioral task
behavioral1
Sample
6721486ed185517ad413f8a4b2e901e6cdc2d28838f5deac35fe136fc7685e36.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
6721486ed185517ad413f8a4b2e901e6cdc2d28838f5deac35fe136fc7685e36.exe
Resource
win10v2004-20220901-en
General
-
Target
6721486ed185517ad413f8a4b2e901e6cdc2d28838f5deac35fe136fc7685e36
-
Size
100KB
-
MD5
7a8fe7dfbe2451a16eaccfef5d19f060
-
SHA1
50608608d040706a0634641d34c2e887f0ec469e
-
SHA256
6721486ed185517ad413f8a4b2e901e6cdc2d28838f5deac35fe136fc7685e36
-
SHA512
819f8f5d5248c282f3741d294f440f941573b0a3a7f74877445b1ae710d380dc7ad93a3cd3caef951312a164b76abea988a3252efb30147ccb5c5d86694f7ff8
-
SSDEEP
1536:rUwD+AMcvQlSUe6VYbnNLJfN4qgujHsyPZjuiN+6Kt/:wwDjMcvcXe6YjhFN4BuIyPZj70P
Malware Config
Signatures
Files
-
6721486ed185517ad413f8a4b2e901e6cdc2d28838f5deac35fe136fc7685e36.exe windows x86
6a6521113ada0ab6ae55447aed9bd454
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlenA
GetCurrentProcess
FlushInstructionCache
InitializeCriticalSection
DeleteCriticalSection
HeapDestroy
GetSystemDirectoryA
EnterCriticalSection
GetCurrentThreadId
LeaveCriticalSection
LoadLibraryA
VirtualProtect
SetLastError
lstrcmpiA
ReadProcessMemory
WideCharToMultiByte
InterlockedDecrement
TerminateProcess
GetStartupInfoA
DeviceIoControl
GetLongPathNameW
lstrlenW
InterlockedIncrement
GetProcAddress
FreeLibrary
GetProcessHeap
HeapAlloc
HeapFree
OpenProcess
CloseHandle
RemoveDirectoryA
FindNextFileA
GetTickCount
MoveFileA
GetWindowsDirectoryA
ReadFile
GetShortPathNameA
SetFileAttributesA
DeleteFileA
GetTempPathA
GetTempFileNameA
MoveFileExA
FindFirstFileA
FindClose
GetEnvironmentVariableA
SetFilePointer
GetFileSize
CreateFileA
GetLastError
LocalFree
SearchPathW
GetFileAttributesA
GetCurrentProcessId
GetModuleHandleA
GetVersionExA
GetVolumeInformationA
LoadLibraryExW
MultiByteToWideChar
user32
MapWindowPoints
LoadStringA
MessageBoxA
PostMessageA
FindWindowExA
BeginPaint
DispatchMessageA
ScreenToClient
DrawTextA
EndPaint
PostQuitMessage
GetWindowLongA
GetParent
GetWindow
GetWindowRect
SystemParametersInfoA
GetClientRect
GetDlgItem
SetWindowPos
GetSystemMetrics
LoadImageA
SendMessageA
SetDlgItemTextA
IsDialogMessageA
SetWindowLongA
DefWindowProcA
DestroyWindow
CreateDialogParamA
TranslateMessage
ShowWindow
PeekMessageA
GetMessageA
gdi32
SelectObject
SetBkMode
SetTextColor
GetStockObject
shell32
ShellExecuteA
CommandLineToArgvW
ole32
CoInitialize
CoUninitialize
comctl32
InitCommonControlsEx
msvcrt
_controlfp
memcpy
_onexit
__dllonexit
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_mbstok
_vsnprintf
fputs
strrchr
_except_handler3
fopen
rewind
_strnicmp
fseek
fprintf
fclose
_osver
??2@YAPAXI@Z
memmove
realloc
free
__CxxFrameHandler
fgets
shlwapi
SHSetValueA
StrCmpNIA
PathAppendA
PathIsDirectoryA
StrStrIW
SHDeleteValueA
StrStrIA
PathCombineA
PathFileExistsA
SHGetValueA
StrChrW
SHDeleteKeyA
psapi
GetModuleInformation
advapi32
SetEntriesInAclA
RegCloseKey
RegOpenKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
CloseServiceHandle
ControlService
ChangeServiceConfigA
OpenServiceA
OpenSCManagerA
RegQueryValueExA
BuildExplicitAccessWithNameA
DeleteAce
GetExplicitEntriesFromAclA
GetUserNameA
GetNamedSecurityInfoA
SetNamedSecurityInfoA
Sections
.text Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ