Static task
static1
Behavioral task
behavioral1
Sample
a6d858e79eda60e77acdd520fcfff1d3709fd19f0716e72fe2c94ccda68600a7.exe
Resource
win7-20220812-en
General
-
Target
a6d858e79eda60e77acdd520fcfff1d3709fd19f0716e72fe2c94ccda68600a7
-
Size
214KB
-
MD5
1114887c36ad1b73fef33ba562185ff1
-
SHA1
be125152a368a6bdcd9da60667e00b559d6fa83b
-
SHA256
a6d858e79eda60e77acdd520fcfff1d3709fd19f0716e72fe2c94ccda68600a7
-
SHA512
12e53f72b93e7abd380a0410c2860f8e5f016fc836ba6316c8ab54d6fb4b76f43247e494a46730a7445f662a8245e727fdb0edb75119fe8b5d5f95a1f23677c0
-
SSDEEP
3072:fspVU12+nXLbqbqS4XGhxRi3XhwsCetU9UMtaLmoF/ZxQWOCjRdSvgWnbyxgpg:1bfSSqi3OrELmonNOCjRU4KmgG
Malware Config
Signatures
Files
-
a6d858e79eda60e77acdd520fcfff1d3709fd19f0716e72fe2c94ccda68600a7.exe windows x86
62e699855bebb3c3e1e38bf341cf5df9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
kernel32
LocalAlloc
LockResource
SizeofResource
LocalFree
FindResourceW
GetCommandLineW
FindResourceExW
GetModuleHandleW
GetCurrentProcess
GetLastError
CloseHandle
GetModuleFileNameW
GetSystemInfo
GetFullPathNameW
GetVersionExW
GetStringTypeExW
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
SetLastError
GetLocalTime
AllocConsole
SetFilePointer
WriteFile
GetStdHandle
lstrcmpiW
WriteConsoleW
GetProcAddress
FreeConsole
FindFirstFileW
SearchPathW
GetTempPathW
HeapAlloc
HeapFree
HeapReAlloc
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetVersionExA
GetProcessHeap
GetStartupInfoW
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualFree
VirtualAlloc
HeapDestroy
HeapCreate
GetModuleHandleA
ExitProcess
GetModuleFileNameA
LoadResource
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
Sleep
HeapSize
GetFileAttributesA
GetCPInfo
GetACP
GetOEMCP
CreateDirectoryW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeCriticalSection
RtlUnwind
InterlockedExchange
GetConsoleCP
GetConsoleMode
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
CompareStringA
CompareStringW
SetEnvironmentVariableA
CreateFileA
FlushFileBuffers
lstrcatW
LoadLibraryA
FindClose
FindNextFileW
CreateFileW
FreeLibrary
GetThreadLocale
RaiseException
IsValidCodePage
user32
GetSystemMetrics
wvsprintfW
CharLowerBuffW
UnregisterClassA
advapi32
CreateWellKnownSid
RegQueryValueExW
GetTokenInformation
RegOpenKeyExW
RegCloseKey
CheckTokenMembership
AllocateAndInitializeSid
FreeSid
GetSidSubAuthority
OpenProcessToken
DuplicateToken
shell32
SHGetFolderPathW
ole32
CoInitialize
oleaut32
VariantInit
VarBstrCat
SysAllocStringLen
SysAllocString
SysAllocStringByteLen
SysStringByteLen
SysStringLen
SysFreeString
shlwapi
PathRemoveBackslashW
PathCombineW
PathAppendW
PathIsRelativeW
PathFindExtensionW
PathAddBackslashW
Sections
.text Size: 96KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE