Static task
static1
Behavioral task
behavioral1
Sample
6c4ba75fa974ada4a19d0cfe5b87168ade542f5df457f0e464fdd8ccf4ac7df0.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
6c4ba75fa974ada4a19d0cfe5b87168ade542f5df457f0e464fdd8ccf4ac7df0.exe
Resource
win10v2004-20220812-en
General
-
Target
6c4ba75fa974ada4a19d0cfe5b87168ade542f5df457f0e464fdd8ccf4ac7df0
-
Size
10.0MB
-
MD5
844ef52c18ef649c4b79cf7ccb6f5277
-
SHA1
67941d8ad35f9163db63e9259a4ef6b7cb06f6c8
-
SHA256
6c4ba75fa974ada4a19d0cfe5b87168ade542f5df457f0e464fdd8ccf4ac7df0
-
SHA512
d0cffe7a19bfbae0675eadfcc14b3faf4107a46a10bb15ed398070f076007248dde346df3a248864dbbd26c229e8608631e3b4863ab23e0f29d7dd73c7cc687f
-
SSDEEP
196608:1FCycjaiFv1wcYLlUiBCfNxBolZkiACyOxzfC:/CycPWZP4PBol1ACyO
Malware Config
Signatures
Files
-
6c4ba75fa974ada4a19d0cfe5b87168ade542f5df457f0e464fdd8ccf4ac7df0.exe windows x86
9e0e6247642f80eecee0cc4b6fd338dd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_FORCE_INTEGRITY
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleW
GetLastError
WaitForMultipleObjects
CreateEventW
CloseHandle
SetEvent
ResetEvent
WaitForSingleObject
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
CreateThread
SignalObjectAndWait
TerminateThread
Sleep
VirtualAlloc
VirtualFree
OpenProcess
VirtualQueryEx
WaitForSingleObjectEx
CreateWaitableTimerW
SetWaitableTimer
LocalAlloc
LocalFree
LoadLibraryW
GetProcAddress
GlobalMemoryStatus
FreeLibrary
Heap32ListNext
Heap32Next
QueryPerformanceCounter
Heap32First
Heap32ListFirst
GetTickCount
GetSystemTimeAsFileTime
Thread32First
Thread32Next
VirtualUnlock
LoadLibraryA
Process32FirstW
VirtualLock
Module32FirstW
GetSystemInfo
Process32NextW
CreateToolhelp32Snapshot
GetCurrentThreadId
Module32NextW
GetCurrentProcessId
QueryPerformanceFrequency
SetThreadPriority
GetCurrentThread
GetProcessHeap
HeapFree
HeapAlloc
HeapReAlloc
SystemTimeToFileTime
LocalFileTimeToFileTime
CompareFileTime
GetLocalTime
FindResourceW
SizeofResource
LoadResource
LockResource
FreeResource
OutputDebugStringW
FileTimeToSystemTime
GetCalendarInfoW
SetLastError
InterlockedCompareExchange
GetWindowsDirectoryW
InterlockedDecrement
FormatMessageW
FileTimeToLocalFileTime
GetLocaleInfoW
TryEnterCriticalSection
InterlockedIncrement
GetTempPathW
RemoveDirectoryW
FindFirstFileW
FindNextFileW
FindClose
GetFileAttributesW
GetModuleHandleA
GetCurrentProcess
RegisterWaitForSingleObject
InterlockedExchange
UnregisterWaitEx
PeekNamedPipe
FlushFileBuffers
DisconnectNamedPipe
ReadFile
GetOverlappedResult
WriteFile
CreateFileW
WaitNamedPipeW
GetComputerNameW
GetFileAttributesExW
GetFileTime
SetFileTime
GetVersion
ResumeThread
GetCommandLineW
CreateProcessW
ConvertDefaultLocale
GetFileSizeEx
GetLogicalDriveStringsW
QueryDosDeviceW
GetSystemDirectoryW
SetThreadAffinityMask
DeleteFileW
GetModuleFileNameW
SetErrorMode
DeviceIoControl
GetStdHandle
GetVolumeInformationW
GetFileSize
SetFileAttributesW
TerminateProcess
GetNumberFormatW
GetVersionExW
WTSGetActiveConsoleSessionId
ProcessIdToSessionId
GetProcessTimes
GlobalAlloc
OpenEventW
CopyFileW
AllocConsole
MultiByteToWideChar
SetUnhandledExceptionFilter
VirtualProtect
VirtualQuery
OpenThread
SuspendThread
GetThreadContext
SetThreadContext
SearchPathW
DuplicateHandle
CreateSemaphoreW
ReleaseSemaphore
GetEnvironmentVariableW
GetVolumeInformationA
ExpandEnvironmentStringsW
VerifyVersionInfoW
VerSetConditionMask
SetHandleInformation
CreateNamedPipeW
ConnectNamedPipe
WideCharToMultiByte
GetThreadPriority
GetLongPathNameW
VirtualAllocEx
ReadProcessMemory
VirtualFreeEx
RaiseException
MoveFileW
GetCurrentDirectoryW
GetCurrentDirectoryA
GlobalFree
SetEndOfFile
SetFilePointerEx
FormatMessageA
GetFullPathNameW
GetFullPathNameA
CreateFileA
SetFilePointer
MapViewOfFile
UnmapViewOfFile
UnlockFile
LockFile
UnlockFileEx
GetFileAttributesA
LockFileEx
GetDiskFreeSpaceW
CreateFileMappingW
GetDiskFreeSpaceA
GetTempPathA
GetSystemTime
AreFileApisANSI
DeleteFileA
ExitProcess
lstrlenA
UnhandledExceptionFilter
IsDebuggerPresent
ReadConsoleInputA
SetConsoleMode
GetConsoleMode
GetFileType
GetConsoleCP
GetStartupInfoW
RtlUnwind
GetCPInfo
LCMapStringA
LCMapStringW
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
HeapCreate
GetModuleFileNameA
SetHandleCount
GetStartupInfoA
HeapSize
FreeEnvironmentStringsW
GetEnvironmentStringsW
InitializeCriticalSectionAndSpinCount
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetTimeZoneInformation
CompareStringW
SetEnvironmentVariableA
SetEnvironmentVariableW
CompareStringA
Sections
.text Size: 2.4MB - Virtual size: 2.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 593KB - Virtual size: 592KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 59KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6.3MB - Virtual size: 6.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 740KB - Virtual size: 2.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE