Static task
static1
Behavioral task
behavioral1
Sample
6be4dfb812c52e5be29d5b4ec5a5c58ff64b681ba820960790da68fba36bb002.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
6be4dfb812c52e5be29d5b4ec5a5c58ff64b681ba820960790da68fba36bb002.exe
Resource
win10v2004-20221111-en
General
-
Target
6be4dfb812c52e5be29d5b4ec5a5c58ff64b681ba820960790da68fba36bb002
-
Size
276KB
-
MD5
50423162fa26b6404d3ef790670cdd50
-
SHA1
0be847c5c725ac649e9e90da61c1ea10bbe2777e
-
SHA256
6be4dfb812c52e5be29d5b4ec5a5c58ff64b681ba820960790da68fba36bb002
-
SHA512
44c094699a32f6e603a8832f1646936b114571008de64b7e026415b18661588dd05628af378db25fdbe1433d15db88dca0cf5eca11da3b4144644ad25f99d9d0
-
SSDEEP
3072:6zloiW7JELVp6u9StigOHpknVIkyCPA8kJ5S1OJXSckCppl3qKIAAPDgZ2VwM:6pobJoX6jC2VnyCP7kTI6cH6u
Malware Config
Signatures
Files
-
6be4dfb812c52e5be29d5b4ec5a5c58ff64b681ba820960790da68fba36bb002.exe windows x86
17551a281b85dd091178d580c362d7e5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTimeFormatA
GetDateFormatA
ReadFile
CloseHandle
GetFileSize
CreateFileA
lstrcmpA
WritePrivateProfileStringA
MulDiv
GetLocalTime
lstrcmpiA
CreateProcessA
GetModuleFileNameA
CreateMutexA
GetCurrentThreadId
CreateEventA
GetPrivateProfileIntA
WriteFile
SetFilePointer
WaitForSingleObject
FindClose
FindNextFileA
FindFirstFileA
SetFileTime
GetFileTime
InitializeCriticalSection
HeapDestroy
DeleteCriticalSection
GlobalLock
GlobalUnlock
GlobalAlloc
InterlockedIncrement
InterlockedDecrement
LockResource
FreeResource
GlobalFree
GlobalHandle
GetShortPathNameA
TerminateThread
CreateThread
ExitThread
GetModuleHandleA
CreateDirectoryA
GetPrivateProfileStringA
GetStringTypeW
GetStringTypeA
GetOEMCP
GetACP
GetCPInfo
LCMapStringW
LCMapStringA
TlsGetValue
TlsAlloc
TlsSetValue
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
HeapSize
TerminateProcess
RtlUnwind
HeapCreate
GetEnvironmentVariableA
VirtualAlloc
VirtualFree
ExitProcess
GetVersion
GetCommandLineA
GetStartupInfoA
HeapFree
HeapAlloc
HeapReAlloc
lstrcpynA
GetProcAddress
FreeLibrary
GetCurrentProcess
FlushInstructionCache
EnterCriticalSection
LeaveCriticalSection
SetEvent
CopyFileA
GetFileAttributesA
GetTickCount
CompareStringW
CompareStringA
lstrlenW
LoadLibraryA
FindResourceExA
FindResourceA
LoadResource
GetVersionExA
GetUserDefaultLangID
lstrcpyA
WideCharToMultiByte
lstrlenA
MultiByteToWideChar
GetLastError
SetLastError
GetWindowsDirectoryA
user32
ReleaseCapture
CreateAcceleratorTableA
GetDesktopWindow
GetClassNameA
BeginPaint
FillRect
CallWindowProcA
GetFocus
SetCapture
SetFocus
GetSysColor
GetWindowTextLengthA
GetWindowTextA
RegisterWindowMessageA
DestroyMenu
RegisterClassExA
InvalidateRgn
AppendMenuA
LoadImageA
GetSystemMetrics
UpdateWindow
IsChild
GetParent
ReleaseDC
DrawTextA
SendMessageA
GetDC
CopyRect
GetClientRect
InvalidateRect
ShowWindow
ScreenToClient
SetWindowPos
GetWindowRect
SetWindowTextA
SetTimer
PtInRect
SetCursor
GetSysColorBrush
LoadMenuA
TrackPopupMenu
GetCursorPos
GetSubMenu
SetMenuItemInfoA
GetClassInfoExA
GetDlgItem
wsprintfA
EndDialog
GetDlgCtrlID
DialogBoxIndirectParamA
DialogBoxParamA
CreateDialogIndirectParamA
CreateDialogParamA
GetMessageA
MsgWaitForMultipleObjects
SetForegroundWindow
FindWindowA
DefWindowProcA
MessageBoxA
GetActiveWindow
IsWindowVisible
RedrawWindow
IsWindow
CreateWindowExA
GetSystemMenu
LoadBitmapA
DestroyWindow
EnableWindow
LoadCursorA
SetClassLongA
PostQuitMessage
CharLowerA
PeekMessageA
IsDialogMessageA
TranslateMessage
DispatchMessageA
GetWindowLongA
GetWindow
SystemParametersInfoA
MapWindowPoints
SetWindowLongA
EndPaint
gdi32
SetBkMode
CreateFontIndirectA
SetTextColor
GetStockObject
GetObjectA
CreateSolidBrush
CreateCompatibleBitmap
CreateCompatibleDC
BitBlt
DeleteDC
GetDeviceCaps
SelectObject
DeleteObject
advapi32
RegCloseKey
RegOpenKeyExA
RegOpenKeyA
RegSetValueExA
RegEnumValueA
RegCreateKeyExA
RegQueryInfoKeyA
RegQueryValueExA
shell32
Shell_NotifyIconA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHGetMalloc
ShellExecuteA
ole32
OleLockRunning
CoTaskMemAlloc
StringFromCLSID
CoTaskMemFree
CLSIDFromProgID
OleUninitialize
OleInitialize
CreateStreamOnHGlobal
CoInitialize
CoUninitialize
CoCreateInstance
CLSIDFromString
oleaut32
DispCallFunc
VariantCopy
VariantChangeType
OleCreateFontIndirect
LoadRegTypeLi
VariantClear
SysAllocStringLen
SysStringLen
SysAllocString
SysFreeString
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
comctl32
ImageList_Destroy
ord17
ImageList_Create
ImageList_AddMasked
Sections
.text Size: 132KB - Virtual size: 130KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 108KB - Virtual size: 108KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ddymnyp Size: 4KB - Virtual size: 84KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE