Static task
static1
Behavioral task
behavioral1
Sample
6c76bde7f451690aa59dc560489c03763dd76f87d93c42ba82498a061969aad9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6c76bde7f451690aa59dc560489c03763dd76f87d93c42ba82498a061969aad9.exe
Resource
win10v2004-20221111-en
General
-
Target
6c76bde7f451690aa59dc560489c03763dd76f87d93c42ba82498a061969aad9
-
Size
630KB
-
MD5
2451c7a2748507546bc993bcda879c90
-
SHA1
4ba85ba28fe9eb6ea5c2a25391585276c72e7c38
-
SHA256
6c76bde7f451690aa59dc560489c03763dd76f87d93c42ba82498a061969aad9
-
SHA512
bccacf926d8e62fde60a373a112948cd142b0c47a7bf1303fefd401f0971b93ffb2eaf8ec093674587cb2cce6384b690f96fb461fc47fe0d102727b1f3a9029c
-
SSDEEP
6144:x1XqN5a73Px3uTBqGcDCn+C5CuAETycC/fZMPxyPlg3zCx/iRzpmFOC:7GuNMMGcAFA0ERMAdg3zCYTmL
Malware Config
Signatures
Files
-
6c76bde7f451690aa59dc560489c03763dd76f87d93c42ba82498a061969aad9.exe windows x86
731ac9c60818e00f408c476feda29178
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemInfo
GetConsoleOutputCP
CompareStringW
MulDiv
lstrcpynW
LocalAlloc
GetExitCodeProcess
LCMapStringW
GetDateFormatW
GlobalSize
LoadLibraryA
GetProcAddress
GetCurrentProcess
FindClose
LocalLock
VirtualAlloc
GetDriveTypeA
user32
IsDialogMessageA
GetKeyState
InsertMenuItemW
GetMenuItemCount
CallWindowProcW
CreateWindowExW
CreateCursor
DestroyWindow
LoadCursorW
MoveWindow
BeginDeferWindowPos
SetCursor
DrawIcon
SetCaretPos
WindowFromPoint
CreateMenu
FillRect
ShowCaret
DeferWindowPos
gdi32
SetTextColor
RestoreDC
SetTextAlign
MoveToEx
SetWindowOrgEx
SetBkColor
EndPage
AddFontResourceW
GetTextMetricsW
comdlg32
ChooseColorW
GetOpenFileNameW
PrintDlgW
GetSaveFileNameW
advapi32
RegEnumKeyExW
RegSetValueExW
IsTextUnicode
RegOpenKeyExW
RegCloseKey
ole32
OleDuplicateData
OleGetClipboard
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 87KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 79KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
oxmoplc Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 186KB - Virtual size: 188KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 186KB - Virtual size: 188KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 260KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE