Static task
static1
Behavioral task
behavioral1
Sample
6429869bd58f69089e63b7be6214c039d39a315db09d487368a60c767ff362ae.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6429869bd58f69089e63b7be6214c039d39a315db09d487368a60c767ff362ae.exe
Resource
win10v2004-20221111-en
General
-
Target
6429869bd58f69089e63b7be6214c039d39a315db09d487368a60c767ff362ae
-
Size
126KB
-
MD5
260c11cb51df6a54d8f961a7e1c2dd5e
-
SHA1
33d8fe6a36a5ea491c988edb2e4f1978263b29fd
-
SHA256
6429869bd58f69089e63b7be6214c039d39a315db09d487368a60c767ff362ae
-
SHA512
ec7741a0b5bf1090e1ee75d3f0dbd01f204c905c78d8b04d6ad2333a327e7c9fd5bc5509ecb3aa533967ba2aadb3ca94cc88ff846960c36c7d43bda9eb5ba45b
-
SSDEEP
3072:vRvNqSoxi1ZUZJijOVqbWizcmYehSgQmmyvk4O6oKGcUOilqo:vRvNqfxibUZJi6VqbWiBF8shOfKlVil
Malware Config
Signatures
Files
-
6429869bd58f69089e63b7be6214c039d39a315db09d487368a60c767ff362ae.exe windows x86
742b3f106ffb54967f40b35567552403
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
FindResourceExA
IsDebuggerPresent
GetProcAddress
SetErrorMode
UpdateResourceA
LocalCompact
GetTempPathA
GetSystemDefaultLCID
GetModuleHandleA
GetTickCount
GlobalFix
VirtualQuery
InitAtomTable
GetLogicalDriveStringsA
GetNamedPipeHandleStateA
IsBadStringPtrA
GetProcessVersion
IsBadCodePtr
SearchPathA
GetProcessHeap
GetCurrentProcessId
GetExitCodeThread
HeapValidate
DuplicateHandle
OutputDebugStringA
DisconnectNamedPipe
GetProfileIntA
GetThreadPriorityBoost
VirtualAllocEx
SetEvent
GetFileAttributesA
GetSystemDefaultLangID
GetCurrentProcess
DosDateTimeToFileTime
GetUserDefaultUILanguage
HeapReAlloc
CancelIo
IsSystemResumeAutomatic
VirtualProtect
CreateIoCompletionPort
CancelWaitableTimer
GetWindowsDirectoryA
GetSystemDirectoryA
LocalShrink
LoadResource
WriteFile
FlushViewOfFile
GlobalUnWire
CreateEventA
GetFileSize
LockResource
FindClose
GetEnvironmentVariableA
FindFirstChangeNotificationA
FindResourceA
PeekConsoleInputA
VirtualLock
CallNamedPipeA
UnlockFile
ClearCommBreak
GlobalCompact
CreateMutexA
GetLongPathNameA
DeleteFileA
CreateWaitableTimerA
LockFile
GetProcessHeaps
MapViewOfFile
LocalAlloc
GetOEMCP
GetSystemDefaultUILanguage
DeleteAtom
GetLogicalDrives
SetFileAttributesA
QueryDosDeviceA
GetCommandLineA
GlobalSize
GlobalAlloc
DeleteFiber
WideCharToMultiByte
GetNamedPipeInfo
SleepEx
OpenEventA
LocalFlags
SignalObjectAndWait
GetUserDefaultLangID
GetThreadSelectorEntry
ContinueDebugEvent
LocalReAlloc
GetFileType
ReleaseSemaphore
FindCloseChangeNotification
GetPrivateProfileSectionNamesA
GetFileInformationByHandle
WaitForMultipleObjectsEx
CreateDirectoryExA
GlobalUnfix
GlobalUnlock
UnmapViewOfFile
WaitForMultipleObjects
AddAtomA
SetFilePointer
DefineDosDeviceA
MultiByteToWideChar
CreateFileMappingA
HeapDestroy
EraseTape
GetProfileStringA
GetMailslotInfo
GetThreadLocale
LocalFree
GetVersion
GetProfileSectionA
GetCommTimeouts
OpenMutexA
OpenProcess
GetCommConfig
GetPrivateProfileSectionA
WaitForSingleObject
GlobalAddAtomA
GetPriorityClass
IsValidCodePage
LoadLibraryA
GetConsoleCursorInfo
FindAtomA
GetStdHandle
GetThreadTimes
DeviceIoControl
EndUpdateResourceA
ReleaseMutex
GlobalLock
OpenFileMappingA
GetVolumeInformationA
VirtualProtectEx
FormatMessageA
SetLastError
GetModuleFileNameA
PostQueuedCompletionStatus
CreateFiber
GetLastError
GetStartupInfoA
msvcrt
time
srand
__set_app_type
_controlfp
exit
strstr
Sections
.text Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE