Static task
static1
Behavioral task
behavioral1
Sample
6de889a8ade80946516781d641d4cd2d12e6cec046255e934a714be8cf28b27c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6de889a8ade80946516781d641d4cd2d12e6cec046255e934a714be8cf28b27c.exe
Resource
win10v2004-20220812-en
General
-
Target
6de889a8ade80946516781d641d4cd2d12e6cec046255e934a714be8cf28b27c
-
Size
238KB
-
MD5
2d20b9893c85e63fa096b4724951d5b6
-
SHA1
4947db4aee9480e813137e07ba80fb661e33247c
-
SHA256
6de889a8ade80946516781d641d4cd2d12e6cec046255e934a714be8cf28b27c
-
SHA512
e10bd91a8e4ddf77423cdabba3137a2fa105ec80ced0c1af2d8972ce47a759a66ab48b0cff8331aac42972c957793dea9feafdbce1b0ffba903c3cf68c1b12e7
-
SSDEEP
6144:49/zviwuaiAQ7WeJmtc0f3mTr6zjreVCWBrIg:AOvaiSbmX6zHwCSUg
Malware Config
Signatures
Files
-
6de889a8ade80946516781d641d4cd2d12e6cec046255e934a714be8cf28b27c.exe windows x86
ec13cdc33b2c7542a89d184a397f38f5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ImageList_Write
ImageList_Remove
ImageList_Create
ImageList_DrawEx
ImageList_DragShowNolock
ImageList_Draw
ImageList_GetBkColor
ImageList_Destroy
comdlg32
GetOpenFileNameA
ChooseColorA
FindTextA
GetSaveFileNameA
user32
GetScrollInfo
GetActiveWindow
GetMenuStringA
IsWindowEnabled
IsWindowVisible
DrawMenuBar
EnableMenuItem
TrackPopupMenu
IsChild
GetMenuState
GetPropA
GetMenuItemID
CharLowerA
GetFocus
DispatchMessageW
GetSysColor
FrameRect
DrawIcon
GetScrollPos
IsMenu
GetWindowTextA
GetMessagePos
GetClientRect
IsDialogMessageA
GetCursor
GetMenuItemInfoA
GetWindow
GetSysColorBrush
GetKeyNameTextA
GetParent
GetSubMenu
DrawIconEx
GetScrollRange
shell32
DragQueryFileA
SHGetSpecialFolderLocation
msvcrt
strncmp
memmove
memcpy
atan
malloc
shlwapi
PathIsContentTypeA
SHStrDupA
SHQueryValueExA
PathIsDirectoryA
SHGetValueA
SHQueryInfoKeyA
PathGetCharTypeA
kernel32
HeapDestroy
GetStartupInfoA
MoveFileExA
FindClose
EnumCalendarInfoA
VirtualAlloc
GetThreadLocale
SizeofResource
GetDateFormatA
GetFileType
ExitThread
GetModuleHandleA
GetProcAddress
CloseHandle
lstrlenA
FindResourceA
ExitProcess
InitializeCriticalSection
GetFullPathNameA
lstrcpynA
RaiseException
SetLastError
GetCurrentThreadId
LocalAlloc
CreateThread
lstrcpyA
GetCommandLineA
GetVersionExA
SetThreadLocale
CreateEventA
SetFilePointer
GetSystemDefaultLangID
HeapFree
GetCPInfo
LoadLibraryA
FindFirstFileA
MoveFileA
LockResource
WideCharToMultiByte
GetCurrentThread
SetEndOfFile
GlobalAlloc
VirtualAllocEx
GetTickCount
lstrcmpA
GlobalDeleteAtom
LoadLibraryExA
GetEnvironmentStrings
GetDiskFreeSpaceA
CompareStringA
GetFileAttributesA
SetHandleCount
Sleep
GetStringTypeA
GetCurrentProcess
VirtualQuery
DeleteFileA
FormatMessageA
GetStdHandle
GetACP
GetLastError
GetLocalTime
WaitForSingleObject
GetFileSize
LocalFree
ole32
CreateBindCtx
Sections
.text Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 197KB - Virtual size: 196KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 512B - Virtual size: 420B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
BSS Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: 1024B - Virtual size: 651B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE