Static task
static1
Behavioral task
behavioral1
Sample
6d6385cfc5b148a46106d8b9e61391d145cdfeb4d90f2332fe896533586c486e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6d6385cfc5b148a46106d8b9e61391d145cdfeb4d90f2332fe896533586c486e.exe
Resource
win10v2004-20220901-en
General
-
Target
6d6385cfc5b148a46106d8b9e61391d145cdfeb4d90f2332fe896533586c486e
-
Size
541KB
-
MD5
510493a47aadf11d27f3ea593994c950
-
SHA1
0639b0a4f9d5119ea3a7749ce06851592753b707
-
SHA256
6d6385cfc5b148a46106d8b9e61391d145cdfeb4d90f2332fe896533586c486e
-
SHA512
7a821a69eb8a2d98abdbee9b6b9a504e925a0c2e196012c6ef4de9c60e102d56f0f9c9b6dfe70aad7cb4d8cd8c7e4c5919d762d1487672ae0d9aa555083d92f5
-
SSDEEP
6144:fg634LnX+eheFht+8Vnyk6tAI5xJ4Oe1akah8lcQxa0N8C/L:o63WnLuhY8gAMxvfglcB0J
Malware Config
Signatures
Files
-
6d6385cfc5b148a46106d8b9e61391d145cdfeb4d90f2332fe896533586c486e.exe windows x86
82eda959347a2ddfaf2926b8c8b20d5b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCreateKeyA
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
RegCloseKey
comctl32
ImageList_Destroy
InitCommonControls
gdi32
SetTextColor
SelectObject
CreateCompatibleDC
BitBlt
DeleteObject
CreateCompatibleBitmap
GetClipBox
SetBkColor
GetObjectA
CreateBitmap
DeleteDC
SaveDC
RestoreDC
GetStockObject
SetViewportOrgEx
OffsetViewportOrgEx
SetMapMode
TextOutA
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetDeviceCaps
PtVisible
RectVisible
Escape
ExtTextOutA
SetViewportExtEx
SetBkMode
kernel32
RaiseException
HeapAlloc
HeapFree
GetCommandLineA
ExitProcess
HeapReAlloc
HeapSize
GetACP
TerminateProcess
Sleep
LCMapStringA
LCMapStringW
LockResource
GetStdHandle
GetFileType
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsA
GetStartupInfoA
RtlUnwind
MultiByteToWideChar
VirtualAlloc
IsBadWritePtr
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
UnmapViewOfFile
GetCurrentProcess
DuplicateHandle
CreateFileMappingA
MapViewOfFile
WritePrivateProfileStringA
SetEndOfFile
FlushFileBuffers
ReadFile
SetFilePointer
WriteFile
CreateFileA
SetErrorMode
GetOEMCP
TlsGetValue
GetCPInfo
GetProcessVersion
EnterCriticalSection
LocalReAlloc
TlsSetValue
TlsFree
GlobalReAlloc
LeaveCriticalSection
TlsAlloc
GlobalHandle
DeleteCriticalSection
InitializeCriticalSection
LocalAlloc
GetLastError
GlobalFlags
SetLastError
LocalFree
MulDiv
SuspendThread
WaitForSingleObject
ResumeThread
GetCurrentThread
GetPrivateProfileStringA
GetTickCount
GlobalAlloc
lstrcmp
HeapDestroy
HeapCreate
GetModuleFileNameA
WideCharToMultiByte
CloseHandle
InterlockedDecrement
InterlockedIncrement
lstrlen
lstrcat
GetCurrentThreadId
GlobalGetAtomNameA
lstrcmpi
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcpy
GlobalLock
GlobalUnlock
GlobalFree
LockResource
FindResourceA
LoadResource
lstrcpyn
VirtualQueryEx
VirtualFree
SetUnhandledExceptionFilter
GetEnvironmentStrings
GetEnvironmentStringsW
GetCurrentDirectoryA
FindClose
OpenProcess
LoadLibraryExA
LoadLibraryA
GetProcAddress
GetModuleHandleA
ReadProcessMemory
FreeLibrary
GetCurrentProcessId
GetVersion
AllocConsole
FindNextFileA
FindFirstFileA
InterlockedExchange
CreateRemoteThread
WriteProcessMemory
VirtualQuery
GetExitCodeThread
TerminateThread
GetThreadContext
SetThreadContext
shell32
ShellExecuteA
user32
ClientToScreen
TranslateMessage
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
WindowFromPoint
GetClassNameA
PtInRect
LoadCursorA
GetSysColorBrush
DestroyMenu
LoadStringA
GetCursorPos
ValidateRect
UpdateWindow
MapWindowPoints
GetSysColor
PeekMessageA
DispatchMessageA
GetFocus
SetFocus
AdjustWindowRectEx
ScreenToClient
CopyRect
GetTopWindow
PostMessageA
GetMenu
GetMenuItemCount
GetWindowTextA
DefWindowProcA
SetCursor
CallNextHookEx
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
RemovePropA
GetMessageTime
GetLastActivePopup
SetForegroundWindow
GetWindow
SetWindowPos
RegisterClipboardFormatA
SystemParametersInfoA
GetWindowPlacement
GetNextDlgTabItem
EndDialog
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetParent
GetDlgItem
IsWindowEnabled
GetDlgCtrlID
GetForegroundWindow
InsertMenuItemA
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
GetKeyState
LoadIconA
IsWindowVisible
IsWindow
GetWindowRect
RedrawWindow
SetWindowLongA
CallWindowProcA
CreatePopupMenu
GetMessagePos
InsertMenuA
TrackPopupMenuEx
GetMessageA
SendDlgItemMessageA
GetAsyncKeyState
MessageBoxA
SendMessageA
EnableWindow
GetMenuCheckMarkDimensions
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetWindowLongA
LoadBitmapA
SetTimer
KillTimer
ShowWindow
SetWindowTextA
IsDialogMessage
SetDlgItemTextA
GetDlgItemTextA
PostQuitMessage
CreateWindowExA
SetWindowsHookExA
WinHelpA
GetClassInfoA
RegisterClassA
ReleaseDC
GetDC
wsprintfA
GetMenuItemID
GetSubMenu
GetCapture
UnregisterClassA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
comdlg32
GetOpenFileNameA
GetSaveFileNameA
Sections
.text Size: 320KB - Virtual size: 320KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 168KB - Virtual size: 172KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.fix Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE