Static task
static1
Behavioral task
behavioral1
Sample
6c4b03af7546ac88d1d19a1d5171bb8b58debd489a5e146b3c59c9415c84045b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6c4b03af7546ac88d1d19a1d5171bb8b58debd489a5e146b3c59c9415c84045b.exe
Resource
win10v2004-20221111-en
General
-
Target
6c4b03af7546ac88d1d19a1d5171bb8b58debd489a5e146b3c59c9415c84045b
-
Size
111KB
-
MD5
a0403365f5dc9296c789f397f06108d0
-
SHA1
281a16318a9ba67e7a9df15abf01b9f7a6a1c355
-
SHA256
6c4b03af7546ac88d1d19a1d5171bb8b58debd489a5e146b3c59c9415c84045b
-
SHA512
0df494464381b9218f4bf2383762d6c53bc1456b5e35261f5c5ffa0a2d5130839e530650601c7c4fd450a3b27e5bc350dad57c0803dcdb478057711d0cc03970
-
SSDEEP
3072:Hewb6mZYjjqxhdW2PfDlSNtxAWIbLACDxEmxDoliQ:nBfdWaxSNzULxxEm17Q
Malware Config
Signatures
Files
-
6c4b03af7546ac88d1d19a1d5171bb8b58debd489a5e146b3c59c9415c84045b.exe windows x86
07cc19dbcf5defc7903002dac1d5ceed
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
ole32
CoTaskMemFree
CoTaskMemAlloc
CoCreateInstance
advpack
RegInstall
user32
LoadStringA
CharUpperA
DispatchMessageA
GetWindowLongA
CreateDialogParamA
GetClientRect
GetDlgItem
wsprintfA
IsWindow
GetWindowTextA
CharPrevA
TranslateMessage
SendMessageA
MsgWaitForMultipleObjects
LoadImageA
DestroyWindow
IsDialogMessageA
SendDlgItemMessageA
DestroyIcon
ReleaseDC
EndDialog
LoadBitmapA
GetWindowRect
DrawTextA
EnableWindow
SetDlgItemTextA
InvalidateRect
PeekMessageA
SetWindowTextA
IsDlgButtonChecked
ShowWindow
CheckDlgButton
DialogBoxParamA
GetDC
SetWindowLongA
SetWindowPos
MessageBoxA
GetSysColor
kernel32
lstrcatA
LocalFree
FreeLibrary
SetEvent
InterlockedDecrement
CreateEventA
CreateThread
lstrcmpiA
lstrcpyA
GetTickCount
HeapSize
DisableThreadLibraryCalls
GetWindowsDirectoryA
GetModuleHandleA
DeleteCriticalSection
GetProcAddress
GetModuleFileNameA
LoadLibraryA
InterlockedIncrement
HeapFree
CreateFileA
HeapAlloc
GetDiskFreeSpaceA
VirtualAlloc
lstrcpynA
InitializeCriticalSection
LocalAlloc
CloseHandle
GetSystemDirectoryA
HeapReAlloc
lstrcmpA
GetProcessHeap
gdi32
SetBkColor
SaveDC
SelectObject
SetGraphicsMode
CreateSolidBrush
RestoreDC
GetTextMetricsA
GetDeviceCaps
ModifyWorldTransform
SetWindowOrgEx
ExtTextOutA
CreateCompatibleDC
CreateFontIndirectA
GetObjectA
SetViewportOrgEx
DPtoLP
DeleteDC
DeleteObject
SetTextColor
BitBlt
advapi32
RegOpenKeyExA
RegCloseKey
RegSetValueExA
RegQueryValueExA
RegEnumValueA
RegDeleteKeyA
RegEnumKeyExA
ntdll
NtAddAtom
atl
AtlMarshalPtrInProc
Sections
.textbss Size: - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 512B - Virtual size: 428B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 79KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 29KB - Virtual size: 49KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE