Static task
static1
Behavioral task
behavioral1
Sample
f6bc9407d2a90f2ea010a966b4534f4ef19779aed7c96c18263fdddefc65147e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f6bc9407d2a90f2ea010a966b4534f4ef19779aed7c96c18263fdddefc65147e.exe
Resource
win10v2004-20220812-en
General
-
Target
f6bc9407d2a90f2ea010a966b4534f4ef19779aed7c96c18263fdddefc65147e
-
Size
416KB
-
MD5
db2020256f08818b23875f8714732759
-
SHA1
14d4a4ea2a404e5f29968b6aa5b1ba75be314313
-
SHA256
f6bc9407d2a90f2ea010a966b4534f4ef19779aed7c96c18263fdddefc65147e
-
SHA512
588f0666741a6ed72c0343f2b086c9e1f6b6c05cfa4357aaedbbc91e6784364c065b14abbd480833c2e1b9bcb621c9c81798a10921ade1056bf951b807e1209b
-
SSDEEP
6144:7jepXY9bjvBSMHQX/fuoVmOC8S2qqktzZfjoaG+cRRVvHiwID4J:epkQMG3bnadj53GVvk4
Malware Config
Signatures
Files
-
f6bc9407d2a90f2ea010a966b4534f4ef19779aed7c96c18263fdddefc65147e.exe windows x86
51fae11857b3cafa0f319a9c96d08a00
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathRenameExtensionA
PathAddBackslashA
PathStripPathA
PathFindFileNameA
oleaut32
LoadTypeLi
comctl32
ord17
InitCommonControlsEx
ImageList_Destroy
ImageList_GetImageCount
ImageList_Draw
winspool.drv
DocumentPropertiesA
ClosePrinter
GetJobA
ord204
OpenPrinterA
GetPrinterA
gdi32
GetNearestPaletteIndex
CreateSolidBrush
CreateDIBSection
CreateBrushIndirect
OffsetWindowOrgEx
RoundRect
GetCurrentObject
LPtoDP
OffsetRgn
GetObjectW
GetTextMetricsW
CreateRoundRectRgn
PtVisible
RealizePalette
GetDeviceCaps
StretchDIBits
SetBkColor
CreatePalette
GetBkColor
PtInRegion
Rectangle
FillPath
ExtSelectClipRgn
DeleteObject
GetFontData
Ellipse
wininet
InternetWriteFile
InternetFindNextFileA
InternetCloseHandle
InternetSetOptionExA
FtpDeleteFileA
InternetSetFilePointer
FtpGetCurrentDirectoryA
InternetQueryDataAvailable
FtpRemoveDirectoryA
FtpFindFirstFileA
HttpOpenRequestA
InternetOpenA
InternetCrackUrlA
InternetCanonicalizeUrlA
FtpRenameFileA
user32
UpdateWindow
RegisterClassExA
LoadIconA
IsIconic
CreatePopupMenu
GetMenuItemID
TabbedTextOutA
SetTimer
SetScrollInfo
SystemParametersInfoA
LoadStringA
DestroyIcon
GetForegroundWindow
ShowScrollBar
DrawFocusRect
KillTimer
DispatchMessageA
AdjustWindowRectEx
CallWindowProcA
ClientToScreen
GetClassLongA
MessageBoxA
RegisterClassA
DefWindowProcA
TrackPopupMenu
ShowWindow
GetIconInfo
WindowFromPoint
CreateWindowExA
DrawTextA
TranslateAcceleratorA
GetDC
GetClientRect
LoadCursorA
LoadBitmapA
GetSystemMetrics
PostThreadMessageA
DestroyCursor
IsDialogMessageA
RedrawWindow
DestroyWindow
kernel32
GetCurrentProcessId
GetCommandLineA
HeapReAlloc
HeapFree
TlsAlloc
GetStringTypeW
SetStdHandle
GetCPInfo
GetStdHandle
GetTimeZoneInformation
UnhandledExceptionFilter
MultiByteToWideChar
GetModuleFileNameA
IsBadCodePtr
LCMapStringA
QueryPerformanceCounter
GetProcAddress
GetTickCount
GetOEMCP
SetFilePointer
GetStringTypeA
DeleteCriticalSection
GetLocalTime
EnterCriticalSection
GetEnvironmentStringsW
SetUnhandledExceptionFilter
InterlockedDecrement
SetLastError
GetSystemTime
RtlUnwind
WideCharToMultiByte
RaiseException
FlushFileBuffers
SetHandleCount
TerminateProcess
ExitProcess
HeapAlloc
LeaveCriticalSection
LoadLibraryA
GetModuleHandleA
HeapDestroy
SetEnvironmentVariableA
GetFileType
GetACP
GetCurrentThreadId
TlsSetValue
VirtualQuery
TlsGetValue
FreeEnvironmentStringsW
GetEnvironmentStrings
LCMapStringW
InterlockedIncrement
ReadFile
GetVersion
VirtualAlloc
VirtualFree
HeapCreate
WriteFile
CompareStringA
GetLastError
GetStartupInfoA
GetSystemTimeAsFileTime
InterlockedExchange
InitializeCriticalSection
CreateMutexA
CompareStringW
GetCurrentProcess
FreeEnvironmentStringsA
CloseHandle
Sections
.text Size: 68KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256KB - Virtual size: 255KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 72KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ