Static task
static1
Behavioral task
behavioral1
Sample
6f6b4add243158c40411ab599a833e59a2a833f19717ad33aede58536990acb9.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
6f6b4add243158c40411ab599a833e59a2a833f19717ad33aede58536990acb9.exe
Resource
win10v2004-20220812-en
General
-
Target
6f6b4add243158c40411ab599a833e59a2a833f19717ad33aede58536990acb9
-
Size
509KB
-
MD5
917484843e7d292914c2b9e742de27a0
-
SHA1
aea5699375f6f82c1b93db4e07204d2d856df997
-
SHA256
6f6b4add243158c40411ab599a833e59a2a833f19717ad33aede58536990acb9
-
SHA512
cfa54349f3015aacf6bf3bce31d1f63dc49d520ff75e778e8b72489eed412e7c56e5da7c0c40a5999cb1f0fab7237ad6b0293379796a327f1653193b88a29cc2
-
SSDEEP
12288:6shGouOUoxNwL/7hrqaU7Cfb8x4qF1uGUc5lN:6shGbroxNMzhrqaU7jx4AQGr5l
Malware Config
Signatures
Files
-
6f6b4add243158c40411ab599a833e59a2a833f19717ad33aede58536990acb9.exe windows x86
7ee5d1043ca3162a9a799d9862fa817a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersionExW
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetConsoleMode
SetConsoleMode
GetStdHandle
MultiByteToWideChar
WideCharToMultiByte
FreeLibrary
LoadLibraryW
LocalFree
FormatMessageW
GetWindowsDirectoryW
CloseHandle
SetFileTime
CreateFileW
SetFileAttributesW
RemoveDirectoryW
MoveFileW
CreateDirectoryW
GetLastError
DeleteFileW
lstrlenW
GetFullPathNameW
GetCurrentDirectoryW
SearchPathW
GetTempPathW
GetTempFileNameW
FindClose
FindFirstFileW
FindNextFileW
GetFileSize
SetFileApisToOEM
DeviceIoControl
ReadFile
WriteFile
SetEndOfFile
GetCurrentProcess
CompareFileTime
FileTimeToSystemTime
GetSystemInfo
GlobalMemoryStatus
GetProcAddress
GetModuleHandleW
DosDateTimeToFileTime
FileTimeToDosDateTime
SystemTimeToFileTime
GetSystemTime
WaitForMultipleObjects
LocalFileTimeToFileTime
OpenEventW
UnmapViewOfFile
MapViewOfFile
OpenFileMappingW
GetTickCount
GetProcessTimes
SetCurrentDirectoryW
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
VirtualAlloc
VirtualFree
WaitForSingleObject
CreateEventW
SetEvent
ResetEvent
CreateSemaphoreW
ReleaseSemaphore
InitializeCriticalSection
GetCommandLineW
FileTimeToLocalFileTime
SetFilePointer
SetConsoleCtrlHandler
user32
CharUpperA
CharNextA
CharUpperW
CharPrevExA
CharLowerW
advapi32
AdjustTokenPrivileges
OpenProcessToken
LookupPrivilegeValueW
oleaut32
VariantCopy
VariantClear
SysAllocStringByteLen
SysFreeString
SysAllocString
msvcrt
_isatty
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
__p___initenv
exit
fputs
strlen
fprintf
__CxxFrameHandler
_CxxThrowException
_purecall
memcmp
memmove
memcpy
malloc
free
_iob
fclose
fgetc
_fileno
fflush
fputc
realloc
memset
_rotl
_rotr
_beginthreadex
_except_handler3
??1type_info@@UAE@XZ
__dllonexit
_onexit
?terminate@@YAXXZ
_exit
_XcptFilter
Sections
.text Size: 420KB - Virtual size: 419KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 776B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
jd�u� Size: 16KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE