Static task
static1
Behavioral task
behavioral1
Sample
c6d3b363209a33b090196d5e7c6ebff42f7d4aa919c46042dc710bb560ab7244.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c6d3b363209a33b090196d5e7c6ebff42f7d4aa919c46042dc710bb560ab7244.exe
Resource
win10v2004-20221111-en
General
-
Target
c6d3b363209a33b090196d5e7c6ebff42f7d4aa919c46042dc710bb560ab7244
-
Size
126KB
-
MD5
26eaa0de899a3a6407e981ca3cb9d4a1
-
SHA1
6a41c261b2c34d45deeb805da04cbb16b9bddd48
-
SHA256
c6d3b363209a33b090196d5e7c6ebff42f7d4aa919c46042dc710bb560ab7244
-
SHA512
1bcc80240582d94f921694d9dd753c025cadfafd29d5fd383c08deb12714e9c4d94338319f2d0b80fc2ca2e049e1426ef8d141538f88019432588f9d134d8861
-
SSDEEP
3072:Sa6nRnsSFieftPYwjlcoLtHOP2xGDguiIbnlgysWBMY1:URnKsFR4aMnWXWBM
Malware Config
Signatures
Files
-
c6d3b363209a33b090196d5e7c6ebff42f7d4aa919c46042dc710bb560ab7244.exe windows x86
11f1bcaa5733d3d100db7c7b5370311b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
LockResource
FindAtomA
GetThreadLocale
CancelIo
GetProcAddress
SetErrorMode
GetFileTime
GetProcessHeap
HeapAlloc
FlushConsoleInputBuffer
CreateRemoteThread
GetConsoleOutputCP
CommConfigDialogA
FindResourceExA
SetLastError
DosDateTimeToFileTime
GetFileType
VirtualProtect
GetTickCount
GetLastError
GetPrivateProfileStructA
GetProcessAffinityMask
SizeofResource
FreeConsole
GetCommMask
WritePrivateProfileSectionA
CreateDirectoryA
FlushFileBuffers
IsBadReadPtr
CreateConsoleScreenBuffer
GetWindowsDirectoryA
CreateSemaphoreA
PeekNamedPipe
GetVolumeInformationA
SearchPathA
CreateMutexA
VirtualFreeEx
PulseEvent
FindResourceA
FreeLibrary
FindCloseChangeNotification
SetEvent
LocalHandle
ReleaseMutex
WaitForSingleObject
GetDiskFreeSpaceExA
ClearCommBreak
OpenMutexA
OpenProcess
DeleteFileA
CreateMailslotA
GetConsoleCursorInfo
GlobalFree
DefineDosDeviceA
GetModuleHandleA
IsBadWritePtr
GetProfileStringA
CreateDirectoryExA
GetPriorityClass
GetCurrentThread
GetCommModemStatus
IsBadStringPtrA
GetUserDefaultLangID
ResumeThread
UpdateResourceA
GetProcessVersion
GetLongPathNameA
OpenSemaphoreA
GetFileSize
FlushInstructionCache
GetSystemDefaultLCID
GetExitCodeProcess
WaitForMultipleObjects
LocalLock
GetStdHandle
MapViewOfFile
GetOEMCP
GetSystemDefaultUILanguage
Beep
GetConsoleCP
GetCurrentThreadId
LocalReAlloc
AreFileApisANSI
CancelWaitableTimer
OutputDebugStringA
OpenFileMappingA
LoadLibraryExA
RemoveDirectoryA
FormatMessageA
MoveFileA
GetExitCodeThread
GetLocalTime
GlobalUnfix
GlobalUnlock
GetPrivateProfileSectionNamesA
CreateFileA
VirtualQueryEx
VirtualUnlock
EraseTape
GetVersion
GetFileAttributesA
CopyFileA
WaitForSingleObjectEx
QueryPerformanceCounter
CreateFiber
PostQueuedCompletionStatus
VirtualProtectEx
GetFullPathNameA
GetCPInfo
ReadProcessMemory
LocalUnlock
GetThreadTimes
GetProfileIntA
IsBadHugeReadPtr
GetACP
GetLargestConsoleWindowSize
WaitForMultipleObjectsEx
GetThreadPriorityBoost
GetProcessWorkingSetSize
CallNamedPipeA
FoldStringA
GetThreadPriority
GlobalAddAtomA
QueueUserAPC
DisconnectNamedPipe
GetCPInfoExA
GlobalFlags
HeapReAlloc
UnmapViewOfFile
AllocConsole
GetBinaryTypeA
GlobalFix
DeleteFiber
ReleaseSemaphore
GetSystemDefaultLangID
LocalCompact
GetFileInformationByHandle
GetCommandLineA
MultiByteToWideChar
GlobalCompact
OpenEventA
GetStartupInfoA
msvcrt
rand
__set_app_type
_controlfp
exit
strstr
Sections
.text Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE