Static task
static1
Behavioral task
behavioral1
Sample
6462a548339816a4c30c0e7508300f97bfd611bc66b456942f764583c27ae23b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6462a548339816a4c30c0e7508300f97bfd611bc66b456942f764583c27ae23b.exe
Resource
win10v2004-20221111-en
General
-
Target
6462a548339816a4c30c0e7508300f97bfd611bc66b456942f764583c27ae23b
-
Size
133KB
-
MD5
0cdd0ab442b454855572fce9f7027600
-
SHA1
ea76234f99510b4735b5e4efb15334440202ca92
-
SHA256
6462a548339816a4c30c0e7508300f97bfd611bc66b456942f764583c27ae23b
-
SHA512
fb0dfc804abf70095c5a4667b8fc43c3e8be353281f7cd0423c90753d789e845fce2c7858a95a8a02b837f4e61b7336fd22c71c1006f4203b5b74558eba05d66
-
SSDEEP
1536:HIb6/2Pgf75CFlRGXCLGCU1XYHRH+LPRxFcGJspW2eOB50sk1VqT0YGBbUrejcT8:HnMgf75CdQ1XYxH+LLprc4
Malware Config
Signatures
Files
-
6462a548339816a4c30c0e7508300f97bfd611bc66b456942f764583c27ae23b.exe windows x86
c46a47d59cbaa07498dae49a6895114e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDateFormatA
FileTimeToSystemTime
lstrcatA
CompareFileTime
lstrlenA
FileTimeToLocalFileTime
lstrcpyA
RtlMoveMemory
lstrcpynA
FindNextFileA
GetCurrentDirectoryA
CloseHandle
RtlZeroMemory
CreateFileA
FlushFileBuffers
SetStdHandle
LoadLibraryA
GetStringTypeW
GetLastError
VirtualAlloc
SetFilePointer
WriteFile
RtlUnwind
VirtualFree
HeapCreate
HeapDestroy
GetStringTypeA
GetStdHandle
SetHandleCount
GetOEMCP
GetACP
GetCPInfo
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetFileType
LCMapStringA
HeapAlloc
HeapFree
GetProcAddress
ExitProcess
GetVersion
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
GlobalAlloc
CreateThread
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GlobalFree
LCMapStringW
MultiByteToWideChar
InitializeCriticalSection
MoveFileA
FindFirstFileA
GetTimeFormatA
GetProcessHeap
GetWindowsDirectoryA
WideCharToMultiByte
user32
GetMenuStringA
GetDialogBaseUnits
GetDC
ReleaseDC
CreateDialogParamA
CreateMenu
GetSubMenu
ShowWindow
GetDlgItemTextA
SendDlgItemMessageA
CreateWindowExA
GetParent
MessageBoxA
PostMessageA
LoadStringA
GetCursorPos
ScreenToClient
ClientToScreen
LoadMenuA
GetMenuItemCount
CreatePopupMenu
GetMenuState
SetWindowLongA
GetWindowRect
GetMenuItemID
AppendMenuA
DestroyMenu
TrackPopupMenu
DialogBoxParamA
GetWindowLongA
EndDialog
EnableWindow
DestroyWindow
SetFocus
GetDlgItem
MapWindowPoints
MoveWindow
GetClientRect
SetWindowPos
SendMessageA
gdi32
GetTextExtentPointA
SelectObject
shell32
SHGetMalloc
SHGetDesktopFolder
ord34
ord46
SHGetPathFromIDListA
SHGetSpecialFolderLocation
SHGetDataFromIDListA
SHGetFileInfoA
ShellExecuteExA
ord35
SHBrowseForFolderA
comctl32
ord340
InitCommonControlsEx
ord334
ord336
ord332
ord329
mscat32
CryptCATAdminCalcHashFromFileHandle
CryptCATAdminEnumCatalogFromHash
CryptCATAdminAcquireContext
CryptCATCatalogInfoFromContext
CryptCATAdminReleaseCatalogContext
CryptCATAdminReleaseContext
crypt32
CertFreeCertificateContext
CertCloseStore
cryptui
CryptUIDlgViewCertificateA
wintrust
WinVerifyTrust
Sections
.text Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE