Static task
static1
Behavioral task
behavioral1
Sample
6fc0f33552e688828b32a156ed6b1a1f76d97bfa583960af1fee76e1c4c0538b.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
6fc0f33552e688828b32a156ed6b1a1f76d97bfa583960af1fee76e1c4c0538b.exe
Resource
win10v2004-20220901-en
General
-
Target
6fc0f33552e688828b32a156ed6b1a1f76d97bfa583960af1fee76e1c4c0538b
-
Size
504KB
-
MD5
035b3e98def6bf2109223949a888b7ef
-
SHA1
71f3584772e7bc894c48aa11d8430de2db1a8111
-
SHA256
6fc0f33552e688828b32a156ed6b1a1f76d97bfa583960af1fee76e1c4c0538b
-
SHA512
c1e8dfeff196d98148cec7b17f6548bead2799b78a3fe60465d3a286877a9a6682d82de4fe0e031c5991b3924deabca30465d326fa898315ef43c6cf9668305d
-
SSDEEP
12288:gsL00qFObtE7zpug3pdN0JHBiWKGr48u0DrETdpDy85bs/ZF:g+0/zIg6HoGkZaQdyob2
Malware Config
Signatures
Files
-
6fc0f33552e688828b32a156ed6b1a1f76d97bfa583960af1fee76e1c4c0538b.exe windows x86
3bc357e4450734293b221c63b0838b61
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHGetDataFromIDListA
SHAddToRecentDocs
ShellExecuteExW
ShellHookProc
kernel32
GetTickCount
LoadLibraryA
VirtualFree
HeapAlloc
IsBadWritePtr
UnhandledExceptionFilter
GetCPInfo
GetTimeZoneInformation
WriteFile
DeleteCriticalSection
GetStdHandle
CloseHandle
WideCharToMultiByte
GetFileType
GetEnvironmentStrings
ReadFile
FreeEnvironmentStringsA
EnterCriticalSection
TlsAlloc
LeaveCriticalSection
GetCurrentThread
InterlockedExchange
GetModuleFileNameA
GetCurrentProcessId
VirtualQuery
HeapReAlloc
ExitProcess
InterlockedIncrement
SetEnvironmentVariableA
SetLastError
SetStdHandle
GetStartupInfoA
GetSystemTimeAsFileTime
HeapFree
FreeEnvironmentStringsW
RtlUnwind
TerminateProcess
GetCommandLineA
CompareStringW
GetVersion
InterlockedDecrement
GetCurrentProcess
GetLastError
GetModuleHandleA
OpenMutexA
HeapCreate
GetProcAddress
MultiByteToWideChar
QueryPerformanceCounter
GetSystemTime
GetLocalTime
CompareStringA
GetCurrentThreadId
GetEnvironmentStringsW
GetStringTypeA
VirtualAlloc
HeapDestroy
GetStringTypeW
LCMapStringW
SetFilePointer
TlsGetValue
TlsSetValue
GetStartupInfoW
TlsFree
GetTempPathA
GetDiskFreeSpaceExW
FlushFileBuffers
GetModuleFileNameW
SetHandleCount
CreateMutexA
LCMapStringA
InitializeCriticalSection
GetCommandLineW
comctl32
ImageList_DrawIndirect
InitCommonControlsEx
ImageList_DragLeave
wininet
InternetUnlockRequestFile
SetUrlCacheConfigInfoW
InternetSetFilePointer
InternetConnectA
HttpCheckDavCompliance
InternetGetLastResponseInfoW
HttpSendRequestExW
user32
SetMenuContextHelpId
DefWindowProcW
FillRect
LoadCursorA
TrackPopupMenu
DdeCreateStringHandleA
ScrollWindow
GetDesktopWindow
GetKeyboardLayoutNameA
SendDlgItemMessageW
DefDlgProcA
RegisterClassExA
GetAncestor
RegisterClassA
SetClassLongA
GetMenuItemInfoA
SetScrollPos
GetClipboardFormatNameA
EnumClipboardFormats
CloseDesktop
MessageBoxA
ShowWindow
FindWindowA
CreateWindowExW
DestroyWindow
GetCursorPos
GetMenuStringA
Sections
.text Size: 128KB - Virtual size: 127KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 243KB - Virtual size: 254KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 120KB - Virtual size: 119KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ