Static task
static1
Behavioral task
behavioral1
Sample
6f50ad14cf82fdadf99ee23d72663db629f9940de24b1507ef51aa4ad650b38c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6f50ad14cf82fdadf99ee23d72663db629f9940de24b1507ef51aa4ad650b38c.exe
Resource
win10v2004-20220812-en
General
-
Target
6f50ad14cf82fdadf99ee23d72663db629f9940de24b1507ef51aa4ad650b38c
-
Size
431KB
-
MD5
0460c0dd58f0cc9f4596646b120172b0
-
SHA1
43a77c1a5311ff5242108315fc18d2f096c122e7
-
SHA256
6f50ad14cf82fdadf99ee23d72663db629f9940de24b1507ef51aa4ad650b38c
-
SHA512
4472e523c78511eef6d6b184fe50412b5c62a2e9f38f0195bbf615cc791c43d1e9c616a3a3f3fffba806cda2d5df37551372476bf3beddfa372d6b7032aa0d66
-
SSDEEP
1536:5WNmDv+NjsPbYuUlnJkJT5LsQHUdZCFSNurlQ1nJ7/2Alw06MgocOJ:5WNsGN4bY1OZ5LsJLNV9Jz26w4
Malware Config
Signatures
Files
-
6f50ad14cf82fdadf99ee23d72663db629f9940de24b1507ef51aa4ad650b38c.exe windows x86
c04b96b33c132a82fa05fba77bcea277
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileTime
GetSystemTimeAsFileTime
GetModuleHandleA
GetVersion
CreateToolhelp32Snapshot
MoveFileExA
DuplicateHandle
CreateFileW
HeapValidate
GetProcAddress
GetCommandLineW
GetCurrentProcess
GetModuleFileNameA
CreateFileW
WriteProcessMemory
OpenProcess
LCMapStringA
MoveFileW
ReadProcessMemory
GetLogicalDrives
LocalReAlloc
GetSystemInfo
GetQueuedCompletionStatus
CreateDirectoryW
LoadLibraryA
ExitProcess
GetSystemDirectoryW
HeapSize
GetCurrentProcessId
GlobalMemoryStatus
LoadModule
GetCommandLineA
Process32Next
CloseHandle
CreateEventW
GetSystemDirectoryA
FreeEnvironmentStringsA
MulDiv
Process32First
user32
UpdateWindow
ShowWindow
DrawEdge
DeferWindowPos
DialogBoxIndirectParamW
TranslateMessage
DefWindowProcA
DrawFrameControl
GetDlgItem
GetKeyboardLayout
CreateWindowExA
DispatchMessageA
CopyAcceleratorTableW
EnumDisplayDevicesW
CreateDialogIndirectParamW
ExitWindowsEx
CharToOemBuffA
DrawTextA
GetClientRect
GetMessageA
GetCaretBlinkTime
RegisterClassExA
advapi32
CreateProcessAsUserW
QueryServiceStatus
CryptCreateHash
GetFileSecurityW
CryptGetProvParam
CryptDeriveKey
CreateServiceW
RegConnectRegistryW
RegEnumKeyExW
shell32
PifMgr_CloseProperties
DllInstall
SheGetDirA
InternalExtractIconListW
PathYetAnotherMakeUniqueName
SHEnumerateUnreadMailAccountsW
SHBrowseForFolder
Control_RunDLLW
ReadCabinetState
IsNetDrive
ShellMessageBoxA
CDefFolderMenu_Create2
SHCreateShellItem
ExtractAssociatedIconW
SHGetDiskFreeSpaceA
FindExecutableA
InternalExtractIconListA
FreeIconList
Options_RunDLLA
gdi32
DeleteMetaFile
Rectangle
ArcTo
GetMetaFileBitsEx
Chord
CreatePenIndirect
CreateDIBSection
CreateFontA
GetDeviceCaps
EnumFontFamiliesExW
CombineRgn
GetCurrentObject
PlgBlt
CreateFontIndirectW
GetWorldTransform
SelectObject
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 324KB - Virtual size: 324KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aspack Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE