Static task
static1
Behavioral task
behavioral1
Sample
6128d3d784d1719f3cd279425c4f0fab98389632bdf9977fbf8bc4e5a62a343c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6128d3d784d1719f3cd279425c4f0fab98389632bdf9977fbf8bc4e5a62a343c.exe
Resource
win10v2004-20220812-en
General
-
Target
6128d3d784d1719f3cd279425c4f0fab98389632bdf9977fbf8bc4e5a62a343c
-
Size
144KB
-
MD5
002219b915e5b59456e86c6316a9d430
-
SHA1
9252f7e75e23b46e685f6abb9aa56b8678ab6941
-
SHA256
6128d3d784d1719f3cd279425c4f0fab98389632bdf9977fbf8bc4e5a62a343c
-
SHA512
9944aec21eb485d678707b94826db77c06acf6256d584b65a9a644bececa692a12ea40241d6362e73ba7c813cdb280330b4175fe3454bfb0ed17746dba88e420
-
SSDEEP
1536:1TH6xygMonhVBKvo0+PNyAqvlFETnCBgTWlpCDnnm9oTiafp3UTStP/Sh7q+bH4K:Vaxye9yAslbKmA1UetPMq+bH4
Malware Config
Signatures
Files
-
6128d3d784d1719f3cd279425c4f0fab98389632bdf9977fbf8bc4e5a62a343c.exe windows x86
8d691eed9206c0d1a9a9755517703603
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTempFileNameA
GetTempPathA
DeleteFileA
InterlockedDecrement
GetModuleFileNameA
GetComputerNameA
InterlockedExchange
MultiByteToWideChar
GetLastError
lstrlenA
GetOEMCP
InterlockedIncrement
SetEndOfFile
LoadLibraryA
CopyFileA
FlushFileBuffers
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
HeapCreate
VirtualFree
ExitProcess
Sleep
CloseHandle
SetFilePointer
GetFileType
WideCharToMultiByte
FindResourceExA
FindResourceA
LoadResource
LockResource
CreateFileA
SizeofResource
GetStdHandle
SetHandleCount
ReadFile
GetConsoleMode
GetConsoleCP
WriteFile
GetCurrentThreadId
GetCPInfo
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStartupInfoA
GetCommandLineA
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
RtlUnwind
VirtualAlloc
GetProcAddress
GetModuleHandleA
IsValidCodePage
user32
SetCursor
EndPaint
UnregisterClassA
DrawTextA
GetClientRect
BeginPaint
DialogBoxParamA
DestroyWindow
DefWindowProcA
PostQuitMessage
SetWindowPos
GetWindowRect
LoadStringA
CreateWindowExA
SetTimer
GetWindowLongA
GetDC
EqualRect
UpdateLayeredWindow
SetWindowLongA
GetCursorPos
SetCapture
EndDialog
MoveWindow
GetWindowDC
ReleaseDC
ReleaseCapture
LoadAcceleratorsA
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
PostMessageA
LoadIconA
LoadCursorA
RegisterClassExA
gdi32
CreateDIBSection
SelectObject
GetDeviceCaps
DeleteDC
DeleteObject
CreateCompatibleDC
ole32
OleUninitialize
OleInitialize
OleDraw
OleRun
CoCreateInstance
OleSetContainedObject
OleCreate
oleaut32
VariantClear
VariantChangeType
VariantCopy
VariantInit
SysFreeString
SysStringLen
SysAllocString
GetErrorInfo
pdh
PdhCollectQueryData
PdhAddCounterA
PdhOpenQueryA
PdhCloseQuery
PdhRemoveCounter
Sections
.text Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE