Static task
static1
Behavioral task
behavioral1
Sample
6f512aeb0e68a0ef983e07df54ca96b923ecb2e3c66edd3236eba55d72ead9ba.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6f512aeb0e68a0ef983e07df54ca96b923ecb2e3c66edd3236eba55d72ead9ba.exe
Resource
win10v2004-20221111-en
General
-
Target
6f512aeb0e68a0ef983e07df54ca96b923ecb2e3c66edd3236eba55d72ead9ba
-
Size
704KB
-
MD5
dfb438ccdd1ab9b28f351c326b4551f5
-
SHA1
f5a7422a26db93d08778fd7e122f0efc16678403
-
SHA256
6f512aeb0e68a0ef983e07df54ca96b923ecb2e3c66edd3236eba55d72ead9ba
-
SHA512
ac795449ae3b1a70fae52b9384de0d7e70e9b61c4bddf9b00e54f0b9e518201f456885aefd39aae767bec369348a587220e9cb3f67337cbd82693aeb3b71b551
-
SSDEEP
12288:k6M0BJbYBYPiXQS5e08BRJl8hVrVfGVvwr6ExxaP6pjqTDhO:k6M0BcAiASXYxOVQK6IaPsO4
Malware Config
Signatures
Files
-
6f512aeb0e68a0ef983e07df54ca96b923ecb2e3c66edd3236eba55d72ead9ba.exe windows x86
d40c9a065935dd3b1b3e1bb5618bf50a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msi
ord70
kernel32
GetModuleFileNameW
GetCommandLineW
CloseHandle
GetLastError
CreateMutexW
GetExitCodeProcess
WaitForSingleObject
CreateProcessW
GetCurrentProcess
GetProcAddress
GetModuleHandleA
GetFileAttributesW
CreateThread
ExpandEnvironmentStringsW
Sleep
CreateFileW
GetTempFileNameW
GetTempPathW
FormatMessageW
SetLastError
GetCurrentThread
GetVersionExW
OpenProcess
GetModuleHandleW
FreeResource
WriteFile
LockResource
LoadResource
SizeofResource
FindResourceW
FlushFileBuffers
CreateFileA
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
LocalFree
SetFilePointer
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
TerminateProcess
RtlUnwind
GetLocaleInfoA
InterlockedDecrement
EnterCriticalSection
LeaveCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
GetConsoleMode
GetCommandLineA
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
GetStartupInfoA
HeapReAlloc
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
ExitProcess
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
HeapSize
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
VirtualAlloc
MultiByteToWideChar
InitializeCriticalSection
LoadLibraryA
GetConsoleCP
user32
CreateDialogParamW
ShowWindow
GetMessageW
GetDesktopWindow
IsDialogMessageW
SetWindowPos
PostThreadMessageW
ExitWindowsEx
LoadStringW
MessageBoxW
DestroyWindow
advapi32
RegQueryValueExW
RegCloseKey
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
OpenThreadToken
shell32
ShellExecuteW
CommandLineToArgvW
oleaut32
SysAllocString
SysFreeString
Sections
.text Size: 76KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 600KB - Virtual size: 598KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ