Static task
static1
Behavioral task
behavioral1
Sample
6a99bd4d47231f7ce51adb386dafdbea15b099291e5bb477eb130d0848302d25.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
6a99bd4d47231f7ce51adb386dafdbea15b099291e5bb477eb130d0848302d25.exe
Resource
win10v2004-20220812-en
General
-
Target
6a99bd4d47231f7ce51adb386dafdbea15b099291e5bb477eb130d0848302d25
-
Size
192KB
-
MD5
3b1b1720b978124acc051e8423361f20
-
SHA1
e88f98460ef250e528b966d3dc72179a80756351
-
SHA256
6a99bd4d47231f7ce51adb386dafdbea15b099291e5bb477eb130d0848302d25
-
SHA512
61b605e701ad11c8fbb6193b134e24195ea7a4c8a3ff941a486ace4ca835ef767d5d5fcf1c220a57081922eff8dee8b478191c4070ded8775b2beb6b811305b8
-
SSDEEP
3072:PLXniopCntDfn7jQTnzgDsf1rgKx1OQqcVw8gNTnkXwwaSn:PXpyMYE1r71dvVPgQwwl
Malware Config
Signatures
Files
-
6a99bd4d47231f7ce51adb386dafdbea15b099291e5bb477eb130d0848302d25.exe windows x86
5d3329b51a94719317fc20a93c5daf86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
WaitForSingleObject
CreateThread
VirtualFree
VirtualAlloc
GetProcAddress
GetModuleHandleA
GetCurrentProcess
LoadLibraryA
GetCommandLineA
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
GetStartupInfoA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapDestroy
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
Sleep
HeapReAlloc
RtlUnwind
HeapSize
MultiByteToWideChar
GetLocaleInfoA
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
Sections
.text Size: 40KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 124KB - Virtual size: 123KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
tntbzmt Size: - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE