Static task
static1
Behavioral task
behavioral1
Sample
6f864cad90aa9847517652ee1f7ba0b3487401628a4edded471d1d5add8e43dc.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6f864cad90aa9847517652ee1f7ba0b3487401628a4edded471d1d5add8e43dc.exe
Resource
win10v2004-20220901-en
General
-
Target
6f864cad90aa9847517652ee1f7ba0b3487401628a4edded471d1d5add8e43dc
-
Size
148KB
-
MD5
0e4e2cf6da8ebd791ebab9874c080f7f
-
SHA1
a5c36f5ad7e7622d0d1b9346b98a3be178b4f7dd
-
SHA256
6f864cad90aa9847517652ee1f7ba0b3487401628a4edded471d1d5add8e43dc
-
SHA512
381758c23c457d860ade0e8d3a46eb3ccc36cf987874e793eabdba6906ff4ee0ed882c96222370adc87b5fb87181b46a751221185d91fedc1c33f036d9999aa3
-
SSDEEP
3072:ltvHfsPfjQdLOj8bS/IqDOJ38tQKFwLxm8cgEh5t3vFFJHFEmXGVXRc:ldqgaQADOJst3wLxm8cTh5VvYmXgXRc
Malware Config
Signatures
Files
-
6f864cad90aa9847517652ee1f7ba0b3487401628a4edded471d1d5add8e43dc.exe windows x86
19207bf01f9f417442fd21726654723a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetHangUp
InternetGetConnectedState
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
ws2_32
WSAGetLastError
gethostbyname
WSAStartup
WSACleanup
psapi
GetModuleFileNameExW
ccl100u
ord2644
ord2189
ord1167
ord2588
ord2565
ord2587
ord2888
ord2137
ord1118
ord2602
ord2144
ord2136
ord2142
ord2193
ord3676
ord3680
ord3671
ord3672
ord3665
ord3666
ord3670
ord2703
ord3057
ord1986
ord1984
ord2883
ord2195
ord2196
ord2622
ord3677
ord2198
ord2187
ord2188
kernel32
LoadLibraryA
InterlockedExchange
InterlockedCompareExchange
LocalAlloc
HeapFree
GetProcessHeap
HeapAlloc
HeapDestroy
HeapReAlloc
HeapSize
Sleep
GetStartupInfoW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
QueryPerformanceCounter
GetSystemTimeAsFileTime
DeleteFileW
RemoveDirectoryW
GetCurrentProcess
GetTickCount
FindFirstFileW
MoveFileExW
CopyFileW
FindNextFileW
FindClose
FindResourceExW
LockResource
GetFileAttributesW
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetProcAddress
FreeLibrary
GetCurrentThreadId
LoadLibraryExW
lstrlenW
GetLastError
InterlockedIncrement
InterlockedDecrement
lstrcmpiW
OpenProcess
Process32NextW
CloseHandle
Process32FirstW
CreateToolhelp32Snapshot
GetCurrentProcessId
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
GetModuleHandleW
GetModuleFileNameW
user32
PostThreadMessageW
PeekMessageW
GetMessageW
TranslateMessage
DispatchMessageW
DestroyWindow
CharNextW
DefWindowProcW
GetWindowLongW
SetWindowLongW
PostQuitMessage
CallWindowProcW
advapi32
RegDeleteKeyW
RegDeleteValueW
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegSetValueExW
RegQueryInfoKeyW
RegEnumKeyExW
RegQueryValueExW
TraceMessage
ole32
CoTaskMemAlloc
CoTaskMemRealloc
CoCreateInstance
CoTaskMemFree
CoUninitialize
CoInitialize
oleaut32
VarUI4FromStr
shlwapi
PathCanonicalizeW
PathAppendW
PathAddBackslashW
msvcr90
malloc
wcsncpy
_waccess
wcsrchr
_beginthreadex
fgetws
swscanf
_controlfp_s
_invoke_watson
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
iswspace
_wfsopen
memcmp
fclose
_wcslwr_s
wcsnlen
wcscat_s
_wcsicmp
_recalloc
wcsncpy_s
wcsstr
??2@YAPAXI@Z
vswprintf_s
memmove_s
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_wcmdln
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
_amsg_exit
_decode_pointer
_onexit
_lock
_encode_pointer
__dllonexit
_unlock
_except_handler4_common
?terminate@@YAXXZ
_purecall
memcpy_s
free
__CxxFrameHandler3
wcslen
memset
_CxxThrowException
??_V@YAXPAX@Z
??3@YAXPAX@Z
Sections
.text Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 82KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE