Static task
static1
Behavioral task
behavioral1
Sample
6ddf0ef6395400c9a3810e39fb1f8ef1ede2821d40a109c2e53d0f00dcfbfa51.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6ddf0ef6395400c9a3810e39fb1f8ef1ede2821d40a109c2e53d0f00dcfbfa51.exe
Resource
win10v2004-20220812-en
General
-
Target
6ddf0ef6395400c9a3810e39fb1f8ef1ede2821d40a109c2e53d0f00dcfbfa51
-
Size
463KB
-
MD5
2671269df3cce2c22c5bb7ee8f3cea80
-
SHA1
59c983ffbd72bc7934f02f3a42fb610ef46cae03
-
SHA256
6ddf0ef6395400c9a3810e39fb1f8ef1ede2821d40a109c2e53d0f00dcfbfa51
-
SHA512
34d3d615208ebde72d7474ad6dc3ca1bfffb33f51164d155b078e4dc8a231283f42b142c81059b4819094e82a38919062620af5cd8c4b465addc2f9697c0df53
-
SSDEEP
6144:EiH3Aj3JWCtfsLjiVrgg8Yutiqq8pTuvgqY91esYYvvmO4QUgSe46BK+rT2YlEw3:tEZPxgg8YuejgTBmO4uSeK+fVlX3R
Malware Config
Signatures
Files
-
6ddf0ef6395400c9a3810e39fb1f8ef1ede2821d40a109c2e53d0f00dcfbfa51.exe windows x86
2f0f41cb27dbf82d68f2f5394511a6a9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
atl
ord23
ord21
ord20
ord22
ord18
ord17
ord16
ord32
kernel32
SetEvent
InterlockedDecrement
CloseHandle
WaitForSingleObject
CreateThread
CreateEventA
GetSystemWindowsDirectoryA
Sleep
lstrcmpiA
GetCurrentThreadId
GetCommandLineA
SetUnhandledExceptionFilter
FreeLibrary
GetProcAddress
LoadLibraryA
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
LeaveCriticalSection
IsBadCodePtr
EnterCriticalSection
TerminateThread
ResetEvent
WideCharToMultiByte
MultiByteToWideChar
WaitForMultipleObjects
lstrlenA
GetLastError
GlobalAlloc
GlobalFree
lstrlenW
GetTickCount
GetModuleHandleA
GetStartupInfoA
user32
CharNextA
PostThreadMessageA
GetMessageA
PeekMessageA
MsgWaitForMultipleObjects
UnregisterClassA
DestroyWindow
PostMessageA
DefWindowProcA
CreateWindowExA
RegisterClassA
DispatchMessageA
ole32
CoUninitialize
CoResumeClassObjects
CoInitializeEx
CoTaskMemFree
CoTaskMemAlloc
CoCreateInstance
CoInitialize
CoTaskMemRealloc
CoSuspendClassObjects
oleaut32
SafeArrayAccessData
SysAllocString
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayGetElement
SafeArrayDestroy
SysAllocStringLen
SysStringLen
VariantInit
SafeArrayCreate
SafeArrayUnaccessData
VariantClear
SysFreeString
SysStringByteLen
msvcp60
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??0logic_error@std@@QAE@ABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@1@@Z
??_7out_of_range@std@@6B@
??1out_of_range@std@@UAE@XZ
??0out_of_range@std@@QAE@ABV01@@Z
??0logic_error@std@@QAE@ABV01@@Z
??0_Lockit@std@@QAE@XZ
??1_Lockit@std@@QAE@XZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
msvcrt
__getmainargs
_acmdln
exit
_XcptFilter
_exit
??1type_info@@UAE@XZ
_onexit
__dllonexit
atof
time
localtime
_initterm
free
wcscpy
strcmp
memcmp
wcstombs
_ftol
fabs
floor
strncpy
strchr
wcslen
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
??0exception@@QAE@ABV0@@Z
strcat
strlen
memcpy
??2@YAPAXI@Z
_purecall
memset
_CxxThrowException
Sections
.text Size: 431KB - Virtual size: 430KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ