Static task
static1
Behavioral task
behavioral1
Sample
6e2c7d0691a01e0788e0e9e04412c582bf6525360d0f093e4bbb52d6f76e67d8.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6e2c7d0691a01e0788e0e9e04412c582bf6525360d0f093e4bbb52d6f76e67d8.exe
Resource
win10v2004-20220812-en
General
-
Target
6e2c7d0691a01e0788e0e9e04412c582bf6525360d0f093e4bbb52d6f76e67d8
-
Size
214KB
-
MD5
1a5f19bff632e3297df4c79af9f391e0
-
SHA1
72c03ed3ebf3cca2d2cfcd5358d39e8b4eee527f
-
SHA256
6e2c7d0691a01e0788e0e9e04412c582bf6525360d0f093e4bbb52d6f76e67d8
-
SHA512
e84150456d76a92b8c6c6b142a3b008a9fb075286e02b943b0d8d6681dea9543164c00067dbdacb8a72d739442127bc4a7119197f1fa4dff4b0195e594a67a81
-
SSDEEP
1536:w9yxlqP21WSh7GjMOsQwx/ulwiC0QuTnA7YfGKmQ3rO4iV8pxw1YF2UNn:wc621xtUMOsQwx/ulC0Qb8O387w1z
Malware Config
Signatures
Files
-
6e2c7d0691a01e0788e0e9e04412c582bf6525360d0f093e4bbb52d6f76e67d8.exe windows x86
940150ef2d1bba1808aed523118d0048
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
PaintDesktop
TranslateAcceleratorW
EnumDisplaySettingsExW
ScreenToClient
WINNLSGetEnableStatus
MessageBoxExW
SetCaretBlinkTime
PostThreadMessageA
GetKeyState
mouse_event
EnableScrollBar
IMPQueryIMEW
GetDlgItemTextA
ModifyMenuA
SetWindowTextA
PostThreadMessageA
TrackPopupMenuEx
BringWindowToTop
CloseWindow
WINNLSEnableIME
RegisterClassExW
CallNextHookEx
DdeCmpStringHandles
TrackMouseEvent
SetWinEventHook
ShowCaret
GetWindowRgn
UnhookWindowsHookEx
TranslateAcceleratorA
EnumClipboardFormats
CharToOemW
FindWindowExA
WINNLSGetEnableStatus
kernel32
WaitCommEvent
FileTimeToSystemTime
GetCommMask
GetPrivateProfileSectionNamesA
TlsGetValue
BuildCommDCBW
SetNamedPipeHandleState
TlsGetValue
TransactNamedPipe
UnmapViewOfFile
LocalFlags
GetBinaryTypeA
GetSystemDirectoryA
GetProcessShutdownParameters
GetThreadTimes
GlobalAlloc
GetProcessShutdownParameters
GetCurrentProcess
GetProcessShutdownParameters
EscapeCommFunction
WritePrivateProfileSectionA
lstrcpyW
LocalFlags
GetThreadTimes
lstrcmpW
LocalFree
GetProcessAffinityMask
SetLocaleInfoW
GetProcessShutdownParameters
Thread32Next
SetConsoleCursor
GetBinaryTypeA
GetBinaryTypeA
CompareFileTime
GetCurrentProcessId
GetCurrentDirectoryA
FindCloseChangeNotification
CreateDirectoryW
Sections
.text Size: 203KB - Virtual size: 236KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.code Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.code Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.code Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE