Static task
static1
Behavioral task
behavioral1
Sample
6a18de83e0d58ee510452498870c416d841b51c09865969862be4a9ce97ec72e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6a18de83e0d58ee510452498870c416d841b51c09865969862be4a9ce97ec72e.exe
Resource
win10v2004-20220812-en
General
-
Target
6a18de83e0d58ee510452498870c416d841b51c09865969862be4a9ce97ec72e
-
Size
304KB
-
MD5
3662c6211e1b4098d4838102a8a03b8c
-
SHA1
527b3781f85c080a47dbf5a5aa12f06d7865adcc
-
SHA256
6a18de83e0d58ee510452498870c416d841b51c09865969862be4a9ce97ec72e
-
SHA512
a1a87674da0c59de88abe195779662ec7d2f03c1b1e2037d85420675af4bebba0fceba5d5c7fa180521407fb6bc3c2b673df60c8ee3875edce4b162a69fb99ed
-
SSDEEP
6144:eiluK1UmksqqDLuqVfVMhG8RYmFfigIArbRdXTgKXw:DH1U1qnuiVb8dMgIAz8Ww
Malware Config
Signatures
Files
-
6a18de83e0d58ee510452498870c416d841b51c09865969862be4a9ce97ec72e.exe windows x86
4ac199bbca56a0948af22397dbfb319a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteFileA
GetTempFileNameA
GetTempPathA
GetTickCount
GetCurrentDirectoryA
SetEndOfFile
GetStringTypeW
GetStringTypeA
SetStdHandle
LoadLibraryA
GetOEMCP
GetACP
GetCPInfo
IsBadCodePtr
SetUnhandledExceptionFilter
IsBadWritePtr
VirtualAlloc
FlushFileBuffers
LCMapStringW
LCMapStringA
GetProcAddress
VirtualFree
HeapCreate
HeapDestroy
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
HeapFree
HeapSize
SetCurrentDirectoryA
SystemTimeToFileTime
GetLocalTime
CompareFileTime
SetFileAttributesA
CloseHandle
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
CreateFileA
FileTimeToDosDateTime
WideCharToMultiByte
MultiByteToWideChar
ReadFile
GetFileSize
GetLastError
LocalFree
FormatMessageA
GetFileTime
WriteFile
IsBadReadPtr
MapViewOfFile
CreateFileMappingA
GetModuleFileNameA
SetFilePointer
UnmapViewOfFile
CreateDirectoryA
GetFileAttributesA
MoveFileA
RtlUnwind
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
HeapReAlloc
HeapAlloc
TerminateProcess
GetCurrentProcess
user32
CreateWindowExA
EndDialog
PostQuitMessage
PostMessageA
SetDlgItemTextA
SendDlgItemMessageA
SetTimer
DialogBoxParamA
MessageBoxA
LoadCursorA
EndPaint
GetDesktopWindow
GetWindowRect
CopyRect
OffsetRect
SetWindowPos
LoadStringA
GetMessageA
TranslateMessage
DispatchMessageA
GetDlgItem
SendMessageA
GetDlgItemTextA
DefWindowProcA
DestroyWindow
BeginPaint
RegisterClassExA
shell32
SHBrowseForFolderA
ShellExecuteA
SHGetPathFromIDListA
SHGetMalloc
Sections
.text Size: 112KB - Virtual size: 111KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 184KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 144KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ