Static task
static1
Behavioral task
behavioral1
Sample
6d674cc2fed38174c5b3e1f2198a328ceffeb8ccdc0d2c9a9acc01120b4d589e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6d674cc2fed38174c5b3e1f2198a328ceffeb8ccdc0d2c9a9acc01120b4d589e.exe
Resource
win10v2004-20221111-en
General
-
Target
6d674cc2fed38174c5b3e1f2198a328ceffeb8ccdc0d2c9a9acc01120b4d589e
-
Size
772KB
-
MD5
8441c7200b747eb3ddc6950c4ec4ead0
-
SHA1
06afe4b5ab436169c7eababa2ad35e040c47811c
-
SHA256
6d674cc2fed38174c5b3e1f2198a328ceffeb8ccdc0d2c9a9acc01120b4d589e
-
SHA512
770f3b502138c90998d6107ed7c3fffc16a77d071e93dadf4aee24e7b449d77508f570d35244a92c734c8c067c6bfeda859881821d2f7a02a29e780e9d32c66a
-
SSDEEP
12288:QYu5XtpqOeQFQkX7rTfaxeEm85InClOQCAFBiEF4w1u7pI8xvBSeIZ:XWtYOjTrTfaxHm85gJQCasEF50u8xsV
Malware Config
Signatures
Files
-
6d674cc2fed38174c5b3e1f2198a328ceffeb8ccdc0d2c9a9acc01120b4d589e.exe windows x86
946a272e2348275d16cceed36533b894
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
CreateBitmapIndirect
GetOutlineTextMetricsW
SetTextCharacterExtra
CreateDCW
GetTextCharsetInfo
FillRgn
CreatePatternBrush
GetTextColor
StartPage
DeleteObject
GetSystemPaletteUse
SetBitmapDimensionEx
SetColorSpace
DeleteMetaFile
CreateFontIndirectA
StrokePath
LineDDA
GetDeviceCaps
RectVisible
GetCharWidthW
DeleteDC
GetEnhMetaFileW
SetTextJustification
SelectClipPath
GetObjectW
comctl32
ImageList_BeginDrag
ImageList_LoadImageW
ImageList_GetDragImage
InitCommonControlsEx
ImageList_SetFilter
ImageList_AddIcon
ImageList_DragEnter
ImageList_Merge
comdlg32
PrintDlgA
FindTextA
GetFileTitleW
kernel32
SetFilePointer
CompareStringA
GetLocaleInfoW
FreeEnvironmentStringsA
VirtualFree
TlsGetValue
UnhandledExceptionFilter
GetNumberFormatA
GetStdHandle
GetDateFormatW
HeapCreate
InterlockedIncrement
CompareStringW
CreateMutexA
GetProcessAffinityMask
GetLocaleInfoA
ExitProcess
EnterCriticalSection
SetHandleCount
GetVersionExA
TlsSetValue
FreeLibrary
SetStdHandle
LocalUnlock
VirtualAlloc
GlobalSize
GetSystemTimeAsFileTime
GetUserDefaultLCID
IsBadWritePtr
OpenMutexA
LoadLibraryA
CloseHandle
GetLastError
MultiByteToWideChar
LCMapStringA
GlobalUnfix
Sleep
GetCurrentProcessId
GetCurrencyFormatA
DebugBreak
FindResourceExA
WriteProfileStringA
GlobalAlloc
GetCPInfo
GetProcAddress
GetEnvironmentStrings
HeapDestroy
LoadResource
GetStringTypeW
GetTempPathW
GetConsoleMode
FreeEnvironmentStringsW
GetDateFormatA
VirtualQuery
LCMapStringW
GetModuleFileNameW
GetPrivateProfileIntA
WideCharToMultiByte
GetStartupInfoW
GetDiskFreeSpaceExA
DeleteCriticalSection
InitializeCriticalSection
GetCommandLineA
GetVolumeInformationA
GetThreadPriority
GetFileType
GetCurrentThreadId
TlsAlloc
WriteFile
GetProcessHeap
EnumSystemLocalesA
CreateThread
CreateFileA
GetCurrentThread
GetCommandLineW
IsBadReadPtr
InterlockedExchange
LeaveCriticalSection
SetThreadAffinityMask
GetConsoleTitleW
GetLogicalDriveStringsW
HeapSize
GetThreadTimes
ReadConsoleW
GetStartupInfoA
OpenFile
GetOEMCP
FlushFileBuffers
ReleaseMutex
TerminateProcess
InitializeCriticalSectionAndSpinCount
QueryPerformanceCounter
SetUnhandledExceptionFilter
IsDebuggerPresent
lstrcmpiW
FindClose
TlsFree
WriteConsoleW
SetLastError
IsValidCodePage
HeapReAlloc
SetEnvironmentVariableA
CreateEventW
WriteConsoleA
GetACP
GetConsoleOutputCP
GetCurrentProcess
GetTimeZoneInformation
IsValidLocale
GetModuleHandleA
FormatMessageW
InterlockedDecrement
RtlUnwind
CreateDirectoryW
GetModuleFileNameA
GetTimeFormatA
GetComputerNameW
CreateEventA
HeapAlloc
HeapFree
GetEnvironmentStringsW
ConvertDefaultLocale
GetConsoleCP
ReadConsoleOutputCharacterA
GetStringTypeA
GetProfileSectionW
GetTickCount
SetConsoleCtrlHandler
ReadFile
wininet
CommitUrlCacheEntryW
InternetWriteFileExA
FindNextUrlCacheEntryExA
FindNextUrlCacheContainerA
FtpCreateDirectoryA
user32
DdeQueryStringW
SetWindowRgn
SetWindowsHookExA
SetCaretPos
DdeQueryNextServer
LoadCursorA
DrawFrame
RegisterClassA
ToAscii
GetMenuItemInfoA
OemKeyScan
GetKeyNameTextA
SetScrollPos
GetWindowTextLengthW
DialogBoxParamA
MessageBoxW
PackDDElParam
ActivateKeyboardLayout
DlgDirSelectExW
GetClassInfoW
GetActiveWindow
ToUnicodeEx
GetCaretPos
CharToOemBuffA
DragObject
DestroyIcon
EnumDesktopWindows
RemovePropW
DlgDirSelectExA
GrayStringA
EnableScrollBar
DefMDIChildProcA
EndDeferWindowPos
CreateWindowExW
GetForegroundWindow
GetPropW
SetPropW
CharLowerBuffA
GetKeyboardLayoutNameA
LoadMenuIndirectW
RegisterClassExA
ExitWindowsEx
ReleaseCapture
IsDlgButtonChecked
GetWindowContextHelpId
IsIconic
DefWindowProcW
GetWindowInfo
UnhookWindowsHook
GetDlgItemTextW
MapVirtualKeyA
GetKeyboardLayoutList
DefMDIChildProcW
DrawTextExW
CreateAcceleratorTableA
DestroyWindow
EnableWindow
PostMessageW
ShowCaret
SetWindowContextHelpId
ShowWindow
LoadAcceleratorsA
CallNextHookEx
SetWindowsHookA
shell32
SHFormatDrive
SHFileOperationA
Sections
.text Size: 184KB - Virtual size: 181KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 408KB - Virtual size: 407KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 140KB - Virtual size: 161KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ