Static task
static1
Behavioral task
behavioral1
Sample
c6523f777eadebac4f57ea0c84e40ef0f1ab0c18309ecb2afa737ee47f175d45.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c6523f777eadebac4f57ea0c84e40ef0f1ab0c18309ecb2afa737ee47f175d45.exe
Resource
win10v2004-20220812-en
General
-
Target
c6523f777eadebac4f57ea0c84e40ef0f1ab0c18309ecb2afa737ee47f175d45
-
Size
141KB
-
MD5
49da260cea2a85d12f9f76dbee31ef40
-
SHA1
710e1ba77d71eb0f5da7388a0dcbc6fa73f46e01
-
SHA256
c6523f777eadebac4f57ea0c84e40ef0f1ab0c18309ecb2afa737ee47f175d45
-
SHA512
77d5920194e0144c8d045e06942bcad4df2dcf6d494270f2d32fada634107256187e04f6e8859df6cdbfb2a1cc495fbc78fedaa6408ee0d73a25c3eeecde0505
-
SSDEEP
3072:MxRxbTWyKjockFwe35Q+W7Z25SI40HccJDwzBa6E:ORtWXo1WY6pZJ0HczB/E
Malware Config
Signatures
Files
-
c6523f777eadebac4f57ea0c84e40ef0f1ab0c18309ecb2afa737ee47f175d45.exe windows x86
ef94e5a1ab43d0ec87dd31a23c4a53f2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
oleacc
LresultFromObject
CreateStdAccessibleObject
kernel32
DisconnectNamedPipe
ResetEvent
LocalAlloc
FindCloseChangeNotification
GetStartupInfoA
GetCurrentThreadId
FindFirstChangeNotificationW
CreateThread
DeleteCriticalSection
WideCharToMultiByte
ConvertFiberToThread
SetUnhandledExceptionFilter
WaitForMultipleObjects
GetLocalTime
CloseHandle
ReleaseSemaphore
FlushFileBuffers
GetCurrentProcessId
ReadFile
LoadLibraryW
lstrcatA
InitializeCriticalSection
LeaveCriticalSection
TlsGetValue
GetTickCount
CreateNamedPipeA
FreeEnvironmentStringsA
TerminateProcess
IsDebuggerPresent
CreateEventA
RemoveDirectoryW
MultiByteToWideChar
EnumResourceNamesA
GetUserDefaultLCID
GetCurrentThread
CreateSemaphoreA
LocalFree
MoveFileW
TlsAlloc
Sleep
GetLastError
GetSystemDirectoryW
GetFullPathNameW
PeekNamedPipe
GetVersionExA
SwitchToThread
EnterCriticalSection
SetEndOfFile
FreeLibrary
FindNextFileW
GetSystemTimeAsFileTime
CreateFileW
GetSystemDirectoryA
GetModuleFileNameW
QueryPerformanceCounter
GetDriveTypeW
GetOverlappedResult
GetProcAddress
TlsSetValue
ExitProcess
TlsFree
FindNextChangeNotification
WriteFile
WaitForSingleObject
SetEvent
InterlockedCompareExchange
LoadLibraryA
GetFileInformationByHandle
GetCurrentProcess
lstrlenA
DeleteFileW
SetFilePointer
InterlockedExchange
UnhandledExceptionFilter
CreateDirectoryW
FindFirstFileW
FindClose
ConnectNamedPipe
Sections
.text Size: 113KB - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ