Static task
static1
Behavioral task
behavioral1
Sample
6066332546048b517f91b14b01816445688032962d5a29a87056c5aa9542e26d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6066332546048b517f91b14b01816445688032962d5a29a87056c5aa9542e26d.exe
Resource
win10v2004-20220901-en
General
-
Target
6066332546048b517f91b14b01816445688032962d5a29a87056c5aa9542e26d
-
Size
129KB
-
MD5
05d245dabe76927b29b3814e6e2b0f11
-
SHA1
13d7bb49c84f436c262b0c6e3e5fc6b2354b3ba5
-
SHA256
6066332546048b517f91b14b01816445688032962d5a29a87056c5aa9542e26d
-
SHA512
50846cc5300f369522e0f12c39399eab236a7d5b1f9df920418610c7df0b3659b0e6dfba1c1e7d3f2485a4409b86f51eff96dc951edc99f391661f141ab17961
-
SSDEEP
3072:JBSJ+3mJ0Q7HJamM++UcUhhVHKGnBTihNGFI6b:vSKmf7HJnp+U3FlnBTihNc1b
Malware Config
Signatures
Files
-
6066332546048b517f91b14b01816445688032962d5a29a87056c5aa9542e26d.exe windows x86
c8d4c64e63504289d764a242b1e02af5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
FlushInstructionCache
InitializeCriticalSection
SetLastError
CreateThread
TerminateThread
FormatMessageW
CreateEventW
IsDebuggerPresent
LeaveCriticalSection
VirtualFree
WaitForMultipleObjects
EnterCriticalSection
OutputDebugStringW
FreeLibrary
DeleteCriticalSection
MultiByteToWideChar
GetCurrentThreadId
InterlockedDecrement
GetCurrentProcessId
LoadLibraryExW
SetEvent
GetSystemTimeAsFileTime
LoadLibraryW
SizeofResource
InterlockedExchange
InterlockedCompareExchange
TerminateProcess
lstrlenW
WaitNamedPipeW
GetStartupInfoW
GetPriorityClass
SetUnhandledExceptionFilter
WideCharToMultiByte
GetProcessHeap
ReleaseMutex
VirtualAlloc
GetModuleHandleW
ResetEvent
IsProcessorFeaturePresent
BuildCommDCBA
LoadResource
GetVersionExW
GetCurrentProcess
QueryPerformanceCounter
RaiseException
LocalFree
CreateMutexW
HeapFree
Sleep
lstrcmpiW
GetModuleFileNameW
WaitForSingleObject
InterlockedIncrement
HeapAlloc
UnhandledExceptionFilter
GetVersion
CloseHandle
VirtualProtect
LoadLibraryExA
LoadLibraryA
GetProcAddress
ReadFile
GetTickCount
lstrlenA
CreateFileA
FindResourceW
ExitProcess
user32
SetForegroundWindow
KillTimer
IsWindow
SetTimer
AppendMenuW
GetWindowLongW
TrackPopupMenu
ReleaseDC
DestroyWindow
GetSystemMetrics
PostMessageW
GetMenuItemInfoW
PostQuitMessage
TranslateMessage
FindWindowW
LoadStringW
DispatchMessageW
GetCursorPos
DefWindowProcW
SetWindowLongW
LoadCursorW
DestroyMenu
DrawTextW
GetSysColorBrush
LoadImageW
RegisterClassExW
GetDoubleClickTime
IsMenu
GetSubMenu
LoadMenuW
SetMenuItemInfoW
GetMessageW
DrawIconEx
CreatePopupMenu
CreateWindowExW
RegisterWindowMessageW
DestroyIcon
GetMenuItemCount
CallWindowProcW
SetMenuDefaultItem
SystemParametersInfoW
UnregisterClassA
GetSysColor
GetDC
FillRect
GetClassInfoExW
CharNextW
DeleteMenu
gdi32
SetTextColor
CreateFontIndirectW
DeleteObject
SetBkColor
SelectObject
advapi32
RegDeleteKeyW
GetUserNameA
RegDeleteValueW
RegEnumKeyExW
RegEnumValueW
RegQueryValueExW
RegOpenKeyExW
RegNotifyChangeKeyValue
RegCreateKeyExW
RegQueryInfoKeyW
RegSetValueExW
RegCloseKey
shell32
SHGetSpecialFolderPathA
ole32
CoTaskMemFree
CoCreateInstance
CoTaskMemAlloc
CoTaskMemRealloc
oleaut32
VarUI4FromStr
shlwapi
PathAppendA
Sections
.text Size: 70KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 35KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ