Static task
static1
Behavioral task
behavioral1
Sample
6b62bc28a5438891a8e773474c50d02aca8c1c123c3c6b84944837874dfa5df8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6b62bc28a5438891a8e773474c50d02aca8c1c123c3c6b84944837874dfa5df8.exe
Resource
win10v2004-20220812-en
General
-
Target
6b62bc28a5438891a8e773474c50d02aca8c1c123c3c6b84944837874dfa5df8
-
Size
248KB
-
MD5
499aae9a43f7e2477bf693ee8d54bfee
-
SHA1
1b06896878d7b80960c482ecb4a4fa21242a4d45
-
SHA256
6b62bc28a5438891a8e773474c50d02aca8c1c123c3c6b84944837874dfa5df8
-
SHA512
16bf89b023c77bb15bb24ed6f6e2e0c32d0c552252a6296505c94cd34f415a5e0e0670472df846e6dadaf4eb47e0f1a5371cde3fcd9a640f5d7ef7758e5b2ef7
-
SSDEEP
6144:19NfOPwve134F0LloHEcwFzXitv28YAZYI7uDVMi1qRTnbp:19N2oG33mRwFrqvqH7ERTt
Malware Config
Signatures
Files
-
6b62bc28a5438891a8e773474c50d02aca8c1c123c3c6b84944837874dfa5df8.exe windows x86
442106497131d511d03c4c8c01158cd0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
CoCreateInstance
gdi32
CreatePen
GetDeviceCaps
CreateSolidBrush
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegCreateKeyExA
user32
GetDoubleClickTime
SystemParametersInfoA
EqualRect
ReleaseDC
GetSystemMetrics
LoadCursorA
GetDC
IsCharAlphaNumericA
GetSysColor
CharNextW
oleaut32
VariantInit
RegisterTypeLi
SysStringByteLen
SysAllocString
UnRegisterTypeLi
SysFreeString
SysStringLen
SysAllocStringByteLen
SysAllocStringLen
VariantChangeType
VariantClear
VarBstrCat
VarBstrCmp
shlwapi
PathStripToRootW
PathRemoveFileSpecW
PathIsRelativeW
PathCanonicalizeW
PathIsURLW
PathRenameExtensionW
PathFileExistsW
kernel32
ReleaseMutex
EnterCriticalSection
SetUnhandledExceptionFilter
HeapDestroy
InitializeCriticalSectionAndSpinCount
LocalFree
CloseHandle
GetSystemTimeAsFileTime
IsDBCSLeadByte
DeleteFileW
FindResourceExW
lstrlenA
GetFullPathNameA
LeaveCriticalSection
IsDebuggerPresent
GetCurrentDirectoryW
GetModuleHandleW
FindFirstFileA
GetModuleHandleA
GetProcessHeap
lstrlenW
GetCurrentDirectoryA
GetUserDefaultLangID
GetFullPathNameW
LockResource
LocalAlloc
WaitForSingleObject
HeapSize
LoadResource
FindClose
HeapReAlloc
HeapFree
RaiseException
DeleteCriticalSection
UnhandledExceptionFilter
DeleteFileA
GetCurrentThreadId
CreateMutexA
FindResourceW
SizeofResource
CopyFileW
IsProcessorFeaturePresent
HeapAlloc
GetStartupInfoA
VirtualAllocEx
lstrcmpA
security
ExportSecurityContext
ImportSecurityContextW
ImportSecurityContextA
QuerySecurityPackageInfoA
ntlanui2
DllCanUnloadNow
Sections
.text Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 219KB - Virtual size: 221KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ