Static task
static1
Behavioral task
behavioral1
Sample
c6ff8408d349f94ef99227aa9fc3a6624e4b5463652097823f011eae3bcfddcd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c6ff8408d349f94ef99227aa9fc3a6624e4b5463652097823f011eae3bcfddcd.exe
Resource
win10v2004-20220812-en
General
-
Target
c6ff8408d349f94ef99227aa9fc3a6624e4b5463652097823f011eae3bcfddcd
-
Size
156KB
-
MD5
3e2e6418e3f7534d0cf094fa74f1d016
-
SHA1
d689226c0f668d979f977cec5272e2fc51a3c793
-
SHA256
c6ff8408d349f94ef99227aa9fc3a6624e4b5463652097823f011eae3bcfddcd
-
SHA512
e41bc4f7523d886e2df439c94397512e66b460b83270897de00a190a02f35db5c501f1837997b3d68451bb17b56e55681e7aee41ff50b7955347eeaf6b89a9ae
-
SSDEEP
3072:opwOH9bVERzZl2CxcKP4hjztt4ebVDzMIMPH:KMZc8ejz7MIC
Malware Config
Signatures
Files
-
c6ff8408d349f94ef99227aa9fc3a6624e4b5463652097823f011eae3bcfddcd.exe windows x86
7705c599b2280d5ff3abec4bc91b43d7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetWindowPos
GetActiveWindow
SetWindowTextA
ValidateRect
GetOpenClipboardWindow
VkKeyScanA
OemToCharBuffW
gdi32
GetSystemPaletteUse
ole32
StgIsStorageFile
CreatePointerMoniker
oleaut32
CreateErrorInfo
kernel32
HeapDestroy
HeapFree
GetNativeSystemInfo
GetConsoleOutputCP
HeapCreate
GetCPInfoExA
GetProcessTimes
InitAtomTable
LocalAlloc
GetCurrentActCtx
LocalFree
EnumSystemCodePagesA
GetProcAddress
GetModuleHandleW
Sections
.text Size: 130KB - Virtual size: 129KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
SHARED Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ