Static task
static1
Behavioral task
behavioral1
Sample
a6d2fe03f364baba958a36321c720b2e4fa02bda697857ab502ad05cc1158823.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a6d2fe03f364baba958a36321c720b2e4fa02bda697857ab502ad05cc1158823.exe
Resource
win10v2004-20220812-en
General
-
Target
a6d2fe03f364baba958a36321c720b2e4fa02bda697857ab502ad05cc1158823
-
Size
114KB
-
MD5
9628d2363676e764ce4b026bcae346f0
-
SHA1
218d69ef2919198c6bd8c9476c4993664bba9923
-
SHA256
a6d2fe03f364baba958a36321c720b2e4fa02bda697857ab502ad05cc1158823
-
SHA512
3239fe565db4053e0b73c831a97da52c097bad720a62c9552dcf1459a2b061c69f910d6b7a3cc12c336cddd674fe8d32918c1558918a852ac58d311a2d049b83
-
SSDEEP
3072:VLJKuuGSGuqoU6LUrgTeJ3yefW7fTv6Tv+5c6:V8uuOoZ0ie5TW7fTvj
Malware Config
Signatures
Files
-
a6d2fe03f364baba958a36321c720b2e4fa02bda697857ab502ad05cc1158823.exe windows x86
532271ec9c70492693fd15182f255470
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapSize
GetConsoleMode
GetConsoleCP
SetFilePointer
MultiByteToWideChar
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
Sleep
RtlUnwind
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
HeapCreate
GetFileType
HeapReAlloc
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetModuleFileNameA
GetModuleFileNameW
GetStdHandle
WriteFile
InterlockedDecrement
GetCurrentThreadId
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
FlushFileBuffers
LCMapStringW
GetStringTypeW
SetStdHandle
WriteConsoleW
CreateFileW
LocalFree
QueryPerformanceFrequency
CloseHandle
LoadLibraryA
LocalAlloc
GlobalFree
HeapAlloc
GetProcAddress
GetLastError
GlobalAlloc
GetProcessHeap
GetModuleHandleW
QueryPerformanceCounter
GetCurrentProcess
SetHandleCount
ExitProcess
DecodePointer
GetCommandLineA
HeapSetInformation
GetStartupInfoW
HeapFree
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
EncodePointer
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LoadLibraryW
user32
DestroyWindow
CloseClipboard
GetWindowRect
TrackPopupMenu
GetMenuItemID
SetCapture
DeleteMenu
IsClipboardFormatAvailable
LoadMenuA
GetClipboardFormatNameA
GetClientRect
CreateMenu
SetFocus
EnumClipboardFormats
EnumWindows
InsertMenuItemW
GetDC
GetScrollInfo
MessageBoxA
EnableMenuItem
GetDlgItem
ScrollWindow
SetWindowLongW
RedrawWindow
LoadStringW
ShowWindow
CreatePopupMenu
WindowFromDC
AppendMenuA
GetMenuItemCount
CreateWindowExW
OpenClipboard
CloseWindow
SendMessageW
CountClipboardFormats
EnableWindow
DialogBoxParamA
SetScrollInfo
GetScrollPos
CheckMenuItem
GetWindow
gdi32
EndPage
BitBlt
GetTextExtentPoint32W
LineTo
DeleteDC
SetPixel
DeleteObject
SelectObject
CreateCompatibleDC
EndDoc
GetStockObject
MoveToEx
comdlg32
PrintDlgA
advapi32
EqualSid
LookupAccountSidA
FreeSid
AllocateAndInitializeSid
OpenProcessToken
comctl32
ord410
Sections
.text Size: 61KB - Virtual size: 61KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 37KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ