Static task
static1
Behavioral task
behavioral1
Sample
6d35a8c3a2db6bc018949f44f324196be835184381448e70056f63e58df04af2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6d35a8c3a2db6bc018949f44f324196be835184381448e70056f63e58df04af2.exe
Resource
win10v2004-20220901-en
General
-
Target
6d35a8c3a2db6bc018949f44f324196be835184381448e70056f63e58df04af2
-
Size
108KB
-
MD5
3f99bd73e5005517aad6f04b2ed65ac3
-
SHA1
898cdc0a316fd07c896fbc85db1d688de51dd36e
-
SHA256
6d35a8c3a2db6bc018949f44f324196be835184381448e70056f63e58df04af2
-
SHA512
49a2c1421ab6bee7ad466da85ad3db095cb312ae73bef681374efe79e7be54c6fd3d8bf93ebda38356b0e7dae762180920ea9a04c4e678f39c3709b0d110354d
-
SSDEEP
1536:iK3wdc/RsE9aZxuKVp0J/e5vXu1jtsT3t/7ZLmEUSEOgYJ/:iK3wwRuufYoJkzZLtcY
Malware Config
Signatures
Files
-
6d35a8c3a2db6bc018949f44f324196be835184381448e70056f63e58df04af2.exe windows x86
09461f33a22bf0ce3d911bf16957c0e5
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateThread
TerminateProcess
GetVersionExA
GetFileType
GetModuleFileNameW
MultiByteToWideChar
TlsGetValue
SetFilePointerEx
lstrlenW
CreateFileA
HeapDestroy
InitializeCriticalSection
InterlockedCompareExchange
HeapAlloc
TlsAlloc
FreeLibrary
WaitForSingleObject
TlsSetValue
RaiseException
DeleteCriticalSection
WideCharToMultiByte
GetVersionExW
LCMapStringW
ReadFile
CreateEventW
GetTickCount
RtlUnwind
IsValidCodePage
GetCPInfo
GetLocaleInfoW
LoadLibraryW
SetConsoleCtrlHandler
FatalAppExitA
IsProcessorFeaturePresent
GetSystemTimeAsFileTime
HeapCreate
SetLastError
TlsFree
InitializeCriticalSectionAndSpinCount
GetProcAddress
DecodePointer
EncodePointer
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
HeapSetInformation
GetCommandLineA
LocalFree
GetStringTypeW
SetFilePointer
SetEvent
CloseHandle
LeaveCriticalSection
FlushFileBuffers
Sleep
HeapReAlloc
GetFileSize
HeapSize
GetModuleFileNameA
GetModuleHandleW
EnterCriticalSection
GetStdHandle
GetCommandLineW
FindClose
GetLastError
FreeLibraryAndExitThread
TryEnterCriticalSection
InterlockedExchange
SetHandleCount
FormatMessageW
ExitProcess
GetEnvironmentStringsW
FreeEnvironmentStringsW
CreateFileW
WriteFile
GetACP
GetOEMCP
HeapFree
VirtualAlloc
GetCurrentThreadId
InterlockedDecrement
GetStartupInfoW
GetCurrentProcessId
GetModuleHandleA
InterlockedIncrement
GetStartupInfoA
QueryPerformanceCounter
GetCurrentProcess
CompareFileTime
GetProcessHeap
GetCurrentThread
user32
SetWindowPos
GetMenuStringA
GetOpenClipboardWindow
CallNextHookEx
CreateWindowExW
PeekMessageW
GetWindowPlacement
ReleaseCapture
SetWindowLongW
CopyRect
CloseClipboard
SetCursorPos
SetClipboardData
GetSysColorBrush
CheckMenuItem
CreateWindowExA
ScrollWindowEx
ChildWindowFromPoint
OffsetRect
DrawTextA
GetSystemMenu
GetWindowRect
wsprintfA
SetCursor
EmptyClipboard
DestroyWindow
EnableWindow
ShowWindow
ShowWindowAsync
GetWindowLongW
PtInRect
UnhookWindowsHookEx
CharNextA
GetMenuItemInfoW
MessageBoxW
GetDlgItemTextA
DispatchMessageA
SetActiveWindow
GetMessageW
CharNextW
MessageBeep
GetSystemMetrics
GetWindowTextA
SetWindowTextA
DrawIcon
PostMessageW
GetParent
MoveWindow
SetFocus
GetKeyState
PostMessageA
FillRect
GetWindowInfo
ReleaseDC
PostQuitMessage
IsWindowVisible
EnableMenuItem
CreatePopupMenu
GetMenuDefaultItem
DialogBoxParamA
GetWindowTextW
IsWindowUnicode
SendMessageW
gdi32
CreateBitmap
ExtCreatePen
ExtSelectClipRgn
CreateRectRgnIndirect
CreateSolidBrush
RestoreDC
MoveToEx
GetDeviceCaps
GetTextExtentPoint32W
SetWindowOrgEx
CreatePenIndirect
SetViewportOrgEx
SelectObject
SetStretchBltMode
GetStretchBltMode
RectVisible
SetBkColor
CreateCompatibleBitmap
CreateFontIndirectW
ExtTextOutW
SelectClipRgn
BitBlt
SetBkMode
CreateDIBitmap
LineTo
StretchBlt
PatBlt
GetObjectA
DeleteObject
CreateCompatibleDC
ExtTextOutA
GetObjectW
Rectangle
CreateDIBSection
SetMapMode
SaveDC
RealizePalette
CreatePalette
DeleteDC
GetClipBox
SelectPalette
GetStockObject
ole32
OleQueryCreateFromData
msi
ord50
Sections
.text Size: 60KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 40KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ