Static task
static1
Behavioral task
behavioral1
Sample
c6594d9a7f8db5431c73c9c4922ab5e3fc944b1de6282187ad06b55a5ffbc4d4.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c6594d9a7f8db5431c73c9c4922ab5e3fc944b1de6282187ad06b55a5ffbc4d4.exe
Resource
win10v2004-20221111-en
General
-
Target
c6594d9a7f8db5431c73c9c4922ab5e3fc944b1de6282187ad06b55a5ffbc4d4
-
Size
520KB
-
MD5
9e73ebe8ad9bb81eba5627060f55a1f6
-
SHA1
0968f106ebac5a62e11fb0ddc2957e50610c67b0
-
SHA256
c6594d9a7f8db5431c73c9c4922ab5e3fc944b1de6282187ad06b55a5ffbc4d4
-
SHA512
5296274853ce65b5925d545ff1f5db5016a38ea3a8dccf2b2b8709f1b1457b9c6fa39fa18b7fe33770a04bd8b3989cd6d0a11765c3bb1ce9bbddd03e8ebdbb72
-
SSDEEP
12288:txPr/c0D0DKZARLxepoIy1I2HCpHW3blM6UsOngNtaQ:/Pr/9RWWpRvsfmQ
Malware Config
Signatures
Files
-
c6594d9a7f8db5431c73c9c4922ab5e3fc944b1de6282187ad06b55a5ffbc4d4.exe windows x86
abdd0dfa6a3661d793c0e3ff381d6442
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetKeyState
RemovePropW
GetCaretPos
GetMessageW
CallWindowProcW
SetDlgItemTextA
CreateWindowExW
GetWindowLongA
GetCursor
MessageBoxA
AdjustWindowRectEx
IsCharLowerW
SetMenuContextHelpId
GetClassNameA
DdeReconnect
DrawStateW
EnumChildWindows
RegisterClassA
DragDetect
GetMenuInfo
DefWindowProcA
SetForegroundWindow
ArrangeIconicWindows
LoadCursorW
DdeInitializeW
EnumDisplaySettingsExW
LoadCursorA
DialogBoxIndirectParamW
ShowScrollBar
RegisterClassExA
DlgDirListComboBoxW
GetClientRect
VkKeyScanW
TabbedTextOutA
GetClassInfoExW
ModifyMenuW
GetDC
DdeKeepStringHandle
DestroyWindow
SendInput
IsClipboardFormatAvailable
GetTopWindow
GetClassNameW
ModifyMenuA
AppendMenuW
ShowWindow
IsZoomed
AppendMenuA
GetKeyboardLayoutNameW
EnableWindow
SendDlgItemMessageW
MessageBoxW
wvsprintfW
SubtractRect
RealGetWindowClass
shell32
SHFileOperationW
FindExecutableA
InternalExtractIconListA
SHGetNewLinkInfo
wininet
InternetQueryFortezzaStatus
InternetTimeFromSystemTimeA
InternetSetOptionExA
GopherCreateLocatorA
SetUrlCacheEntryGroupA
FtpGetFileW
InternetTimeToSystemTimeW
FindNextUrlCacheContainerW
comctl32
InitCommonControlsEx
ImageList_Remove
kernel32
TlsFree
ReadFile
CompareStringA
GlobalAddAtomA
GetEnvironmentStringsW
LoadLibraryA
UnhandledExceptionFilter
HeapDestroy
GetStartupInfoA
CreateDirectoryExA
LCMapStringW
CreateMutexA
SetStdHandle
FreeEnvironmentStringsA
WriteFile
GetOEMCP
InterlockedIncrement
WideCharToMultiByte
GetModuleFileNameA
GetCurrentProcess
FlushFileBuffers
LCMapStringA
GetFileType
InterlockedExchange
IsBadWritePtr
QueryPerformanceCounter
GetLastError
LeaveCriticalSection
OpenMutexA
HeapCreate
GetSystemTime
HeapAlloc
CompareStringW
HeapFree
GetCurrentThreadId
TlsGetValue
LoadResource
HeapReAlloc
GetModuleHandleA
GetCompressedFileSizeW
GetLocalTime
GetCPInfo
GetEnvironmentStrings
RtlUnwind
GetCurrentProcessId
TlsAlloc
FindResourceA
GetStdHandle
VirtualAlloc
GetTimeZoneInformation
GetLogicalDriveStringsW
WriteConsoleInputW
GetModuleFileNameW
SetConsoleCursorPosition
GetStringTypeA
EnumTimeFormatsW
FreeEnvironmentStringsW
GetVersion
VirtualFree
CloseHandle
DeleteFileA
VirtualQuery
EnterCriticalSection
MultiByteToWideChar
InitializeCriticalSection
SetWaitableTimer
TlsSetValue
SetFilePointer
SetLastError
GetACP
GetVolumeInformationW
GetStringTypeW
GetCommandLineA
ExitProcess
InterlockedDecrement
GetSystemTimeAsFileTime
SetEnvironmentVariableA
TerminateProcess
GetTickCount
GetProcAddress
SetHandleCount
GetCurrentThread
DeleteCriticalSection
comdlg32
LoadAlterBitmap
ReplaceTextW
FindTextW
Sections
.text Size: 140KB - Virtual size: 139KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 260KB - Virtual size: 256KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 108KB - Virtual size: 123KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ