Static task
static1
Behavioral task
behavioral1
Sample
f6f3100c44b4927e88bab6d22ca546133710d90895f0912377d02519492c01a2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f6f3100c44b4927e88bab6d22ca546133710d90895f0912377d02519492c01a2.exe
Resource
win10v2004-20220812-en
General
-
Target
f6f3100c44b4927e88bab6d22ca546133710d90895f0912377d02519492c01a2
-
Size
973KB
-
MD5
a350c29262f972ddc35b5c5d38c2e080
-
SHA1
a83396db1f89ca33d8f13bf9ff374279beac214d
-
SHA256
f6f3100c44b4927e88bab6d22ca546133710d90895f0912377d02519492c01a2
-
SHA512
c49da48fe51cccb510e34ed80572ed961ef9b26902d3fe14822f3ece1ee671d8549932c42345d32caa5ecaa24615d8e0f58c708c694dfb9077f9c9b346c391c5
-
SSDEEP
6144:QlyRZfJlNsBtzt+nGqB0ww6ZEK1neqq8LlJnpm:QlSZfJlNMKB0wjZEKhC8phs
Malware Config
Signatures
Files
-
f6f3100c44b4927e88bab6d22ca546133710d90895f0912377d02519492c01a2.exe windows x86
4e3ed48b249220143a335268b8f80d5d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
CreatePolyPolygonRgn
DeleteObject
GetDeviceCaps
GetStockObject
GetTextExtentPointW
GetTextMetricsW
PolyTextOutA
ScaleViewportExtEx
SelectObject
SetTextAlign
SetTextJustification
kernel32
DisableThreadLibraryCalls
EnumDateFormatsA
FindFirstFileW
FreeLibrary
GetModuleFileNameW
GetModuleHandleW
GetProcAddress
GetSystemWindowsDirectoryA
GetVersion
GetVersionExA
LoadLibraryW
LocalFree
QueryPerformanceFrequency
ResetEvent
SuspendThread
lstrlenW
VirtualAlloc
ExitProcess
GetModuleHandleA
TerminateProcess
GetCurrentProcess
IsBadReadPtr
LoadLibraryA
GetLastError
GetStartupInfoA
GetCommandLineA
DeleteCriticalSection
LeaveCriticalSection
FatalAppExitA
EnterCriticalSection
RaiseException
GetACP
GetOEMCP
GetCPInfo
TlsAlloc
SetLastError
GetCurrentThreadId
GetCurrentThread
TlsFree
TlsSetValue
TlsGetValue
MultiByteToWideChar
WideCharToMultiByte
SetHandleCount
GetStdHandle
GetFileType
WriteFile
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
HeapFree
InitializeCriticalSection
HeapAlloc
RtlUnwind
HeapReAlloc
HeapSize
InterlockedExchange
VirtualQuery
SetUnhandledExceptionFilter
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
IsBadWritePtr
IsBadCodePtr
GetLocaleInfoA
VirtualProtect
GetSystemInfo
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
SetFilePointer
FlushFileBuffers
SetConsoleCtrlHandler
GetTimeZoneInformation
SetStdHandle
CloseHandle
GetLocaleInfoW
CompareStringA
CompareStringW
SetEnvironmentVariableA
ole32
WdtpInterfacePointer_UserUnmarshal
CoUninitialize
CoRevokeMallocSpy
CoInitialize
CoCreateInstance
CoCreateGuid
shell32
RealShellExecuteW
user32
SetWindowPos
SetWinEventHook
SetFocus
SendDlgItemMessageW
ShowWindow
UnhookWindowsHook
GetDC
AdjustWindowRect
BeginPaint
CharUpperBuffA
CheckDlgButton
CreateDesktopW
CreateDialogIndirectParamW
DragDetect
EnableWindow
EndDialog
EndPaint
GetDialogBaseUnits
GetDlgItem
GetParent
GetSystemMetrics
GetWindowLongA
GetWindowRect
IsCharAlphaW
IsDialogMessageA
IsDlgButtonChecked
MapWindowPoints
MoveWindow
ReleaseDC
Sections
.text Size: 88KB - Virtual size: 87KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 864KB - Virtual size: 873KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE