Static task
static1
Behavioral task
behavioral1
Sample
a6e6ed61d2b513d018401edc42b129b889c0c577b590976b8e878cb856feeec5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a6e6ed61d2b513d018401edc42b129b889c0c577b590976b8e878cb856feeec5.exe
Resource
win10v2004-20220901-en
General
-
Target
a6e6ed61d2b513d018401edc42b129b889c0c577b590976b8e878cb856feeec5
-
Size
4.6MB
-
MD5
3d5f10cb753937f28793ca4353f322e7
-
SHA1
4e221bb47f647ad297cf9dc6dcbaf865a9731f70
-
SHA256
a6e6ed61d2b513d018401edc42b129b889c0c577b590976b8e878cb856feeec5
-
SHA512
05e20705125a7981b0312f3be74255721b02296c6d6e19fccdd795e2ac6c696fad7ecbe791d981606c9cc272d58f9ce733a0ec016cfbe0651bb10c685dca07c1
-
SSDEEP
98304:OlG4NRZB+AHHyrDZVogLFPI0qS8JHV4Fk9aZskktZnA/UcNEs5beIh+Sp2rb:03DOGgp9gV4Fk4ZFktZAscpgIh+9f
Malware Config
Signatures
Files
-
a6e6ed61d2b513d018401edc42b129b889c0c577b590976b8e878cb856feeec5.exe windows x86
a8889e5b8ff4bb3efd2228376c501b66
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLongPathNameA
GetLogicalDriveStringsA
MultiByteToWideChar
SetCurrentDirectoryA
SetFilePointer
GetFileType
DuplicateHandle
GetCurrentProcess
CreateFileA
ReadFile
SystemTimeToFileTime
GetCurrentDirectoryA
DosDateTimeToFileTime
SetFileTime
WriteFile
GetTempPathA
GetDiskFreeSpaceA
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
FlushFileBuffers
SetStdHandle
RtlUnwind
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetOEMCP
GetACP
GetCPInfo
RemoveDirectoryA
FindFirstFileA
FindNextFileA
FindClose
GetLastError
CreateProcessA
WaitForSingleObject
CloseHandle
WritePrivateProfileStringA
DeleteFileA
SetFileAttributesA
CopyFileA
GetShortPathNameA
WinExec
CreateDirectoryA
lstrlenA
GetModuleFileNameA
GetWindowsDirectoryA
TlsGetValue
SetLastError
TlsAlloc
TlsSetValue
GetCurrentThreadId
SetHandleCount
GetSystemDirectoryA
SetEndOfFile
VirtualAlloc
VirtualFree
HeapCreate
ExitProcess
TerminateProcess
IsBadWritePtr
IsBadReadPtr
HeapValidate
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
DebugBreak
GetStdHandle
InterlockedDecrement
OutputDebugStringA
GetProcAddress
LoadLibraryA
InterlockedIncrement
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapAlloc
HeapReAlloc
HeapFree
HeapDestroy
user32
DialogBoxParamA
CallWindowProcA
EndPaint
KillTimer
EnableWindow
SetTimer
SetWindowTextA
ShowWindow
BeginPaint
GetClientRect
GetDlgCtrlID
SetDlgItemTextA
GetDlgItemTextA
EndDialog
MessageBoxA
FillRect
InvalidateRgn
GetFocus
DrawFocusRect
GetDlgItem
GetDC
SendMessageA
GetSystemMetrics
SetWindowPos
SetWindowLongA
ReleaseDC
LoadCursorA
SetCursor
gdi32
SetBkMode
CreateFontA
TextOutA
SetTextColor
SetBkColor
ExtTextOutA
GetObjectA
CreateFontIndirectA
SelectObject
GetTextExtentPoint32A
CreateSolidBrush
advapi32
RegCloseKey
RegSetValueExA
RegOpenKeyA
RegQueryValueExA
RegCreateKeyA
shell32
SHBrowseForFolderA
SHGetMalloc
ShellExecuteA
SHGetPathFromIDListA
ole32
CoInitialize
CoCreateInstance
comctl32
ord17
shlwapi
PathFileExistsA
SHDeleteKeyA
Sections
.text Size: 88KB - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 436KB - Virtual size: 434KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ