Static task
static1
Behavioral task
behavioral1
Sample
a6ad872675415e22bd4488a10504d2c69d6707289feecd2cbf6decd87fec19be.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a6ad872675415e22bd4488a10504d2c69d6707289feecd2cbf6decd87fec19be.exe
Resource
win10v2004-20220812-en
General
-
Target
a6ad872675415e22bd4488a10504d2c69d6707289feecd2cbf6decd87fec19be
-
Size
311KB
-
MD5
4524b76162e308e95d8d385a81a255bb
-
SHA1
71f8fa189f574bf57282620943547b546d8f024f
-
SHA256
a6ad872675415e22bd4488a10504d2c69d6707289feecd2cbf6decd87fec19be
-
SHA512
5309561dc865a8b9237aed6b367cd9ebd293e15622d0048fe06c651c0ad3fadf49509837eac79b77e5baa7978d82126904871209a637c7cb1e94d16a2c3f0d6b
-
SSDEEP
3072:4LkG2fULlnJZ445pVO6mcc3XB1CmxOu7KHNwEcv4v6vOouKetY9U4/uXby+:skGCUTZ/53jmcYGk17KOEymo3etYhmb
Malware Config
Signatures
Files
-
a6ad872675415e22bd4488a10504d2c69d6707289feecd2cbf6decd87fec19be.exe windows x86
ed88141319f3ee98c5a779feab01f246
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersionExW
GetComputerNameW
lstrcpyW
GetModuleHandleA
CopyFileW
GetModuleHandleW
DelayLoadFailureHook
RemoveDirectoryW
lstrcpynW
EnterCriticalSection
DisableThreadLibraryCalls
LoadLibraryA
GetWindowsDirectoryW
SetLastError
LocalFree
SetFileAttributesW
GetFileAttributesW
FreeLibrary
MultiByteToWideChar
GetProcAddress
LoadLibraryW
GetSystemDirectoryW
WritePrivateProfileStringW
ExpandEnvironmentStringsW
WaitForSingleObject
CloseHandle
WriteFile
CreateFileW
GetTempPathW
GetExitCodeProcess
WaitForMultipleObjects
CreateProcessW
FindClose
FindNextFileW
MoveFileW
FindFirstFileW
LoadLibraryExW
GetStartupInfoW
Sleep
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
LeaveCriticalSection
HeapFree
lstrlenW
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
DeleteFileW
SetFilePointer
WideCharToMultiByte
OutputDebugStringW
HeapAlloc
GetProcessHeap
advapi32
RegSetValueW
RegSetValueExW
RegOpenKeyExW
RegEnumKeyExW
RegCloseKey
RegCreateKeyW
RegDeleteKeyW
CloseServiceHandle
GetLengthSid
OpenServiceW
OpenSCManagerW
QueryServiceStatus
PrivilegeCheck
LookupPrivilegeValueW
OpenThreadToken
OpenProcessToken
msvcrt
malloc
_write
_iob
fprintf
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
__initenv
_cexit
_XcptFilter
_exit
_c_exit
strrchr
_close
_open
exit
gdi32
GetDeviceCaps
CreateFontIndirectW
DeleteObject
user32
ReleaseDC
GetDC
SetFocus
SetWindowTextW
SetForegroundWindow
SendDlgItemMessageW
GetDlgItemTextW
ScreenToClient
LoadStringW
SetDlgItemInt
FillRect
GetClientRect
GetSysColorBrush
DefWindowProcW
WinHelpW
LoadImageW
LoadCursorW
DispatchMessageW
DialogBoxParamW
MessageBoxW
CreateDialogParamW
GetDesktopWindow
MoveWindow
SetDlgItemTextW
ShowWindow
CharPrevW
CharNextW
IsDlgButtonChecked
GetWindowTextW
SendMessageW
GetDlgItem
EnableWindow
SetCursor
wsprintfW
IsWindow
BringWindowToTop
DestroyWindow
EndDialog
PeekMessageW
FindWindowW
UpdateWindow
GetWindowRect
GetSystemMetrics
SetWindowPos
GetParent
MsgWaitForMultipleObjects
GetWindowLongW
PostMessageW
SetWindowLongW
CheckDlgButton
RegisterWindowMessageW
Sections
.text Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 229KB - Virtual size: 234KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ