Static task
static1
Behavioral task
behavioral1
Sample
6b07ccff5daf607c9b17f352d8804894156166ffa57d1d8607b330e0bbd6b8be.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6b07ccff5daf607c9b17f352d8804894156166ffa57d1d8607b330e0bbd6b8be.exe
Resource
win10v2004-20221111-en
General
-
Target
6b07ccff5daf607c9b17f352d8804894156166ffa57d1d8607b330e0bbd6b8be
-
Size
366KB
-
MD5
1334fcb635c55f3857c6319e3b05f027
-
SHA1
0c4c1ddc9e87d73ead2b8acee724c9b8aed545c3
-
SHA256
6b07ccff5daf607c9b17f352d8804894156166ffa57d1d8607b330e0bbd6b8be
-
SHA512
ab912c3a84c82658b1e058529d84293beeefcd659c4364891e7f27723604796eeef40f4ec03a179b7cd2fead65e5eb79b34dcfe6fab82f3072d97f2113273395
-
SSDEEP
6144:wRjEggNean6gnoL07IfCEuqg8wEo4CKuKp40Q6Aa9L9Ako8hyN3al:01tCfoB6Fqt43KQwL9phyNK
Malware Config
Signatures
Files
-
6b07ccff5daf607c9b17f352d8804894156166ffa57d1d8607b330e0bbd6b8be.exe windows x86
f25868a5c411667d646346e970f94a0d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapCreate
LCMapStringA
RtlZeroMemory
CloseHandle
FreeEnvironmentStringsW
SetEvent
ExitProcess
TlsGetValue
RtlUnwind
GetFileType
CreateFileA
CreateMutexA
GetCurrentThreadId
QueryPerformanceCounter
GetCurrentProcess
InitializeCriticalSection
LockResource
HeapFree
GetTimeZoneInformation
LeaveCriticalSection
GetStringTypeW
GetCurrentProcessId
TlsAlloc
GetEnvironmentStrings
GetConsoleTitleA
LoadLibraryA
IsBadWritePtr
GetCPInfo
WriteFile
InterlockedIncrement
SetLastError
GetOEMCP
GetLocalTime
GetProcAddress
LCMapStringW
VirtualQuery
GetStdHandle
GetSystemTime
SetEnvironmentVariableA
GetCurrentThread
GetACP
HeapReAlloc
GetSystemTimeAsFileTime
VirtualFree
CompareStringW
EnterCriticalSection
lstrcatA
FreeEnvironmentStringsA
GlobalFindAtomW
UnhandledExceptionFilter
MultiByteToWideChar
ReadFile
WaitForDebugEvent
TerminateProcess
DeleteCriticalSection
GetModuleFileNameA
SetHandleCount
HeapValidate
InterlockedExchange
WideCharToMultiByte
HeapDestroy
GetModuleHandleA
GetProcessHeaps
SetConsoleScreenBufferSize
TlsFree
SetStdHandle
GetStringTypeA
OpenSemaphoreA
SetUnhandledExceptionFilter
FindResourceA
GetLastError
GetStartupInfoA
TlsSetValue
GetEnvironmentStringsW
SetFilePointer
VirtualAlloc
OpenMutexA
GetVersion
HeapAlloc
GetTickCount
CreateNamedPipeW
GetFileAttributesA
CompareStringA
FlushFileBuffers
GetCommandLineA
InterlockedDecrement
comctl32
ImageList_SetOverlayImage
ImageList_LoadImage
ImageList_SetDragCursorImage
DrawStatusTextA
ImageList_AddMasked
ImageList_Copy
ImageList_SetFlags
InitCommonControlsEx
ImageList_SetIconSize
ImageList_DrawEx
CreatePropertySheetPageA
MakeDragList
ImageList_GetDragImage
user32
MsgWaitForMultipleObjects
EnumThreadWindows
SetKeyboardState
RedrawWindow
GetScrollRange
DrawStateW
ChangeMenuW
GetScrollInfo
CreateWindowExW
DefWindowProcA
GetDlgCtrlID
GetPropW
RegisterClassExA
OpenWindowStationA
TranslateAcceleratorA
ExitWindowsEx
WindowFromDC
SetClassWord
CharLowerBuffW
ShowWindow
IsCharUpperA
EnumPropsW
ChangeDisplaySettingsW
EndDeferWindowPos
FlashWindow
SetCaretPos
RegisterClassA
IsDlgButtonChecked
MessageBoxA
DdeConnectList
wsprintfA
LockWindowUpdate
IsDialogMessageW
IsDialogMessageA
DefMDIChildProcA
GetMenuCheckMarkDimensions
DdeSetUserHandle
GetSystemMenu
GetMessageTime
GetWindowRgn
GetAltTabInfo
DestroyWindow
SetDlgItemTextW
SendInput
UnregisterClassW
Sections
.text Size: 160KB - Virtual size: 159KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 71KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 92KB - Virtual size: 119KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ