Static task
static1
Behavioral task
behavioral1
Sample
c6dc8a62725d69ee1bf7a1ebec82ddeba6aa6c3dfd33cbdffcdce1268e86f290.exe
Resource
win7-20220901-en
General
-
Target
c6dc8a62725d69ee1bf7a1ebec82ddeba6aa6c3dfd33cbdffcdce1268e86f290
-
Size
123KB
-
MD5
0697f26a9261f92e5b17703eb81bae00
-
SHA1
18374c8dfa3fa7aa92c590a7b9c1b7821ed213eb
-
SHA256
c6dc8a62725d69ee1bf7a1ebec82ddeba6aa6c3dfd33cbdffcdce1268e86f290
-
SHA512
1eb1bba717a8b460c130e996292bad23ee2f78c0848f2ddbc73d5ab0228521be833e9f79a702685d139c43f58e3d078f33834a1c6871900fe8d2851353f938d1
-
SSDEEP
3072:EhVNWENBnLDROkoiXdmblQBajAxHbZO2pYaWY:a/ROkzYhF2ZRhN
Malware Config
Signatures
Files
-
c6dc8a62725d69ee1bf7a1ebec82ddeba6aa6c3dfd33cbdffcdce1268e86f290.exe windows x86
a3ea42152e9d80e3e5553fbf7eb13f49
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mfc100u
ord6247
ord2216
ord3993
ord11202
ord8112
ord13380
ord10937
ord3402
ord11073
ord8277
ord14060
ord14059
ord14132
ord14149
ord14145
ord14147
ord14148
ord14146
ord2418
ord7384
ord2884
ord2887
ord12610
ord5558
ord2766
ord7565
ord4444
ord4445
ord5469
ord11423
ord1529
ord12563
ord5280
ord12561
ord5279
ord10447
ord5296
ord7986
ord8485
ord10804
ord10799
ord4756
ord3407
ord4084
ord10511
ord9470
ord8490
ord11714
ord10441
ord2256
ord3486
ord5108
ord10262
ord6374
ord6723
ord433
ord987
ord8435
ord11168
ord7559
ord11404
ord280
ord902
ord1310
ord1312
ord9232
ord9235
ord6869
ord890
ord1292
ord776
ord1203
ord345
ord923
ord296
ord286
ord11030
ord1990
ord1986
ord11021
ord1987
ord1934
ord7616
ord850
ord12791
ord1592
ord13756
ord11470
ord381
ord948
ord6711
ord3627
ord6140
ord8346
ord9328
ord5118
ord11845
ord11209
ord11240
ord9498
ord7391
ord4086
ord11236
ord11228
ord5261
ord3416
ord13568
ord13571
ord13569
ord13572
ord13567
ord13570
ord7179
ord11469
ord13267
ord10976
ord14162
ord1739
ord7126
ord11864
ord3625
ord3684
ord8530
ord13387
ord7108
ord13381
ord11477
ord11476
ord2164
ord4744
ord13854
ord11784
ord7548
ord7624
ord6036
ord11031
ord5828
ord8347
ord11116
ord5276
ord12557
ord8393
ord11163
ord11081
ord2417
ord7385
ord12606
ord5556
ord2756
ord2980
ord2981
ord9525
ord10412
ord10058
ord8179
ord11123
ord5264
ord285
ord2629
ord2620
ord1479
ord2068
ord2064
ord266
ord265
ord6580
ord6831
ord6667
ord6696
ord772
ord11244
ord3879
ord1992
ord2008
ord10022
ord4274
ord2057
ord4113
ord5855
ord4290
ord3446
ord5862
ord2185
ord1944
ord4355
ord12944
ord12186
ord796
ord6080
ord11998
ord7967
ord7529
ord322
ord13605
ord4102
ord4100
ord4103
ord10045
ord2093
ord13396
ord2025
ord11330
ord8359
ord9329
ord5117
ord3413
ord13804
ord13950
ord13939
ord13962
ord13743
ord14216
ord13738
ord14129
ord12886
ord12685
ord2504
ord4981
ord5538
ord8220
ord3425
ord10070
ord10300
ord8337
ord11707
ord4950
ord11509
ord14211
ord8615
ord2376
ord11882
ord11086
ord3671
ord3623
ord13309
ord4765
ord4757
ord9497
ord14131
ord13890
ord13891
ord13870
ord13901
ord13871
ord5104
ord6223
ord5530
ord1626
ord11612
ord13324
ord5674
ord10543
ord5489
ord4652
ord7577
ord11928
ord9408
ord9334
ord11471
ord10784
ord8324
ord10423
ord9222
ord4827
ord10505
ord8536
ord8539
ord8620
ord10503
ord10429
ord10223
ord9355
ord2983
ord3480
ord10275
ord4965
ord10024
ord10071
ord10301
ord291
ord1317
ord307
ord311
ord7524
ord7913
ord4220
ord1308
ord287
ord1440
ord903
ord316
ord6655
ord6865
ord886
ord1288
ord11115
ord8363
ord2338
ord6155
ord11210
ord11080
ord7474
ord10305
ord10308
ord8640
ord8655
ord8645
ord9075
ord9080
ord8657
ord10160
ord9562
ord8073
ord8063
ord10750
ord10164
ord8151
ord10185
ord9139
ord9140
ord6582
ord774
ord1209
ord9387
ord9332
ord5302
ord5141
ord7314
ord10749
ord8795
ord10389
ord8629
ord10357
ord9367
ord10209
ord10811
ord9553
ord10253
ord10243
ord10383
ord5473
ord10302
ord1501
ord1508
ord1514
ord1512
ord1519
ord4388
ord4425
ord4396
ord4408
ord4404
ord4400
ord4430
ord4421
ord4392
ord4434
ord4413
ord4379
ord4383
ord4416
ord3999
ord14067
ord3992
ord2665
ord13382
ord7109
ord13388
ord6156
ord10725
ord12554
ord5275
ord2339
ord3491
ord2952
ord2951
ord2852
ord11159
ord4642
ord4923
ord5115
ord8483
ord4901
ord5143
ord4645
ord4794
ord4623
ord6931
ord6932
ord6922
ord4792
ord7393
ord9333
ord8350
ord11094
ord11464
ord8471
ord1195
ord8374
ord2853
ord12724
ord8009
ord11246
ord752
ord1198
ord755
ord6827
ord6571
ord2089
ord1298
ord1207
ord1300
msvcr100
mbstowcs_s
__CxxFrameHandler3
memcpy
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
_controlfp_s
_invoke_watson
_except_handler4_common
?terminate@@YAXXZ
_onexit
_lock
__dllonexit
_unlock
__set_app_type
_fmode
_commode
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_wcmdln
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
_amsg_exit
_purecall
malloc
free
_wsetlocale
wcstombs_s
kernel32
MultiByteToWideChar
LoadLibraryW
GetUserDefaultLCID
IsDebuggerPresent
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
SetUnhandledExceptionFilter
DecodePointer
EncodePointer
GetStartupInfoW
HeapSetInformation
InterlockedCompareExchange
Sleep
InterlockedExchange
InterlockedDecrement
InterlockedIncrement
MulDiv
GetLocaleInfoW
user32
GetDC
EnableWindow
MessageBeep
ReleaseDC
gdi32
GetTextExtentPoint32W
GetTextMetricsW
CreateFontW
ole32
CoTaskMemAlloc
Sections
.text Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 81KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE