Static task
static1
Behavioral task
behavioral1
Sample
6d900c0563a4c12bb12aba19fac5079aa15753a66e40332f30c7a1fa40563bcb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6d900c0563a4c12bb12aba19fac5079aa15753a66e40332f30c7a1fa40563bcb.exe
Resource
win10v2004-20220812-en
General
-
Target
6d900c0563a4c12bb12aba19fac5079aa15753a66e40332f30c7a1fa40563bcb
-
Size
44KB
-
MD5
81359041259e7d7b86b1cfdaf8d9f980
-
SHA1
719873c2b49c8969a9d1db19e7873f9745775a01
-
SHA256
6d900c0563a4c12bb12aba19fac5079aa15753a66e40332f30c7a1fa40563bcb
-
SHA512
41c47d43932cfe9cad7bbebe7acd0bd305fc2685eb7ae8de70287fb443d100c62b541a085a964c3f011d02dd2de1900b6d6150b606e4de750c980579ba65e782
-
SSDEEP
384:7iT9NydzhZ9oOK1CjkilLjx7CyYxVdorxL6660aj/niBdQ647gYR7T:7kzy52OK1UjxGVHU66fM/niG7gYR7T
Malware Config
Signatures
Files
-
6d900c0563a4c12bb12aba19fac5079aa15753a66e40332f30c7a1fa40563bcb.exe windows x86
ad7de82c0d1c7d1c92d946c3205eb977
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord1997
ord6392
ord5194
ord533
ord6407
ord665
ord1979
ord798
ord5186
ord354
ord561
ord815
ord5778
ord1575
ord6883
ord825
ord823
ord4204
ord5710
ord2781
ord4058
ord3181
ord3178
ord926
ord537
ord2818
ord541
ord5861
ord922
ord4202
ord2764
ord535
ord941
ord939
ord4278
ord551
ord3811
ord2820
ord801
ord860
ord540
ord2915
ord5572
ord924
ord800
ord5683
ord4129
ord858
ord4277
ord356
ord2770
ord1980
ord6385
ord668
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
__p___initenv
exit
_XcptFilter
_exit
_onexit
__dllonexit
time
srand
rand
getenv
atoi
__CxxFrameHandler
_except_handler3
_mbscmp
kernel32
GetWindowsDirectoryA
CopyFileA
GetShortPathNameA
WaitForSingleObject
lstrlenA
GetModuleHandleA
GetCommandLineA
GetModuleFileNameA
GetTempPathA
MultiByteToWideChar
SetFileAttributesA
GetFileAttributesA
CloseHandle
Process32Next
OpenProcess
WinExec
TerminateProcess
Process32First
CreateToolhelp32Snapshot
DeleteFileA
GetVersionExA
HeapDestroy
HeapAlloc
HeapCreate
WritePrivateProfileStringA
Sleep
advapi32
InitializeAcl
LookupAccountNameA
AddAccessAllowedAce
SetNamedSecurityInfoA
RegDeleteValueA
RegEnumKeyExA
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
AllocateAndInitializeSid
shell32
ShellExecuteExA
SHFileOperationA
ole32
CoCreateInstance
CoInitialize
CoUninitialize
msvcp60
??1_Winit@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
?endl@std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@1@AAV21@@Z
??0Init@ios_base@std@@QAE@XZ
?cerr@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
??6std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@0@AAV10@PBD@Z
wininet
FindFirstUrlCacheEntryA
FindNextUrlCacheEntryA
FindCloseUrlCache
Sections
.text Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ