Static task
static1
Behavioral task
behavioral1
Sample
006d7909b0283fadb3a426fc296ec16b3a7df6399275f99ca6e60b57ac394ffd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
006d7909b0283fadb3a426fc296ec16b3a7df6399275f99ca6e60b57ac394ffd.exe
Resource
win10v2004-20220901-en
General
-
Target
006d7909b0283fadb3a426fc296ec16b3a7df6399275f99ca6e60b57ac394ffd
-
Size
427KB
-
MD5
1d5136dcc116dfc02806b373e8454fd8
-
SHA1
1494fb74ac6cbe96a34c8375885294f6ba83f844
-
SHA256
006d7909b0283fadb3a426fc296ec16b3a7df6399275f99ca6e60b57ac394ffd
-
SHA512
92fef9d615ee0f12e7250523002c6a916fdb78e691217c66ae5036e9239cdbdbed0dc763c21b9404bf813b9b0c171a9b518c517f7d7df5be4ff38a26c2cfbe7e
-
SSDEEP
6144:vSIhOJAuwOYjPlGWPcKMvrHcSE9D9KVi5TfeK8nihVBZEMVaeNLlBAaH/stRmGjQ:aLJ+Pl1M7c39pAeEMseNpBj/NElNg
Malware Config
Signatures
Files
-
006d7909b0283fadb3a426fc296ec16b3a7df6399275f99ca6e60b57ac394ffd.exe windows x86
6a8de8772de38bd81eb16c604a66176c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
isalpha
strtol
strtoul
_strcmpi
strstr
strncpy
strchr
_stricmp
atoi
_fullpath
_except_handler3
strrchr
atol
tolower
_exit
_strnicmp
strncmp
??3@YAXPAX@Z
??2@YAPAXI@Z
remove
_itoa
toupper
isspace
_chdrive
_c_exit
_XcptFilter
_cexit
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
isdigit
memmove
advapi32
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegCreateKeyExA
kernel32
MultiByteToWideChar
GlobalFree
GlobalUnlock
GlobalLock
GetProfileStringA
GetSystemDefaultLangID
GlobalReAlloc
GlobalAlloc
GetTimeZoneInformation
FindClose
FindFirstFileA
GetFileInformationByHandle
_llseek
GetSystemDirectoryA
GetModuleHandleW
GetProfileIntA
CloseHandle
GetVersionExA
GetStartupInfoA
MapViewOfFile
CreateFileMappingA
GetCurrentThread
GetModuleFileNameA
IsValidLocale
GlobalSize
VirtualAlloc
VirtualFree
_lclose
_lcreat
_lwrite
_lread
GetLastError
_lopen
SetEndOfFile
SetFilePointer
DeleteFileA
FindNextFileA
GetTickCount
SetCurrentDirectoryA
CopyFileA
MoveFileA
SetFileAttributesA
FileTimeToLocalFileTime
SystemTimeToFileTime
GetSystemTime
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
ExpandEnvironmentStringsA
SearchPathA
GetPrivateProfileStringA
GetTempPathA
GetTempFileNameA
CreateDirectoryA
GetCurrentDirectoryA
GetSystemWindowsDirectoryA
GetWindowsDirectoryA
lstrcmpiA
GetFileAttributesA
GetModuleHandleA
SetErrorMode
LoadLibraryA
GetBinaryTypeA
FreeLibrary
Sleep
GetProcAddress
WinExec
GetUserDefaultLCID
CompareStringA
MulDiv
LocalSize
lstrcpynA
IsDBCSLeadByte
lstrcpyA
lstrlenA
LocalAlloc
LocalReAlloc
LocalFree
GetLocaleInfoA
gdi32
EnumFontFamiliesExA
GetTextAlign
SetTextAlign
GetTextColor
GetBkColor
Escape
SetAbortProc
StartDocA
EndDoc
CreateDCA
StartPage
EndPage
GetSystemPaletteEntries
CreatePen
IntersectClipRect
UnrealizeObject
SetBrushOrgEx
CreatePatternBrush
GetTextExtentPoint32A
CreateFontA
CreateRectRgn
SetRectRgn
CombineRgn
InvertRgn
PatBlt
ExtTextOutA
GetTextExtentPointW
GetTextExtentPointA
SetBkMode
TextOutW
TextOutA
GetTextCharset
GetTextMetricsA
MoveToEx
LineTo
Rectangle
GetStockObject
SetPixel
CreateCompatibleBitmap
GetTextFaceA
SetROP2
TranslateCharsetInfo
GetObjectA
DeleteObject
GetNearestColor
CreateCompatibleDC
SelectObject
SetTextColor
SetBkColor
SetViewportOrgEx
SetWindowExtEx
SetViewportExtEx
PlayMetaFile
DeleteDC
CreateDiscardableBitmap
CreateSolidBrush
BitBlt
SetStretchBltMode
StretchBlt
CreateICA
GetDeviceCaps
CreatePalette
SaveDC
SetMapMode
SetWindowOrgEx
LPtoDP
RestoreDC
SetMetaFileBitsEx
CreateBitmap
SetDIBits
CreateDIBitmap
SelectPalette
RealizePalette
DeleteMetaFile
CreateFontIndirectA
user32
CheckDlgButton
EnumWindows
RegisterClassA
UnregisterClassA
DrawFocusRect
GetAsyncKeyState
ValidateRect
EnumChildWindows
GetWindowDC
CopyRect
CreateDialogParamA
IsDialogMessageA
ScrollWindow
SetScrollRange
GetScrollPos
SetScrollPos
ReleaseCapture
GetClassNameA
EnumThreadWindows
DialogBoxParamA
OffsetRect
KillTimer
GetFocus
PeekMessageA
GetSysColorBrush
BeginPaint
EndPaint
ChildWindowFromPoint
GetMessagePos
MonitorFromPoint
GetMonitorInfoA
SetWindowPos
SetCursor
ClientToScreen
FrameRect
InflateRect
SetCapture
SetMessageQueue
GetMessageA
TranslateAcceleratorA
wsprintfA
CallWindowProcA
PostMessageA
GetParent
GetClientRect
SetDlgItemTextA
GetWindowLongA
GetDlgItemTextA
GetWindowTextLengthA
IsWindowEnabled
EndDialog
SetWindowLongA
SetFocus
EnableWindow
IsClipboardFormatAvailable
GetDlgItem
SendDlgItemMessageA
CharNextA
CharPrevA
WinHelpA
CharLowerA
GetSysColor
InvertRect
SetRect
GetActiveWindow
IsWindow
FillRect
SetTimer
ShowWindow
IsWindowVisible
SetActiveWindow
InvalidateRect
SendMessageA
GetWindowRect
SetForegroundWindow
IsIconic
FindWindowA
CreatePopupMenu
AppendMenuA
GetKeyState
DrawMenuBar
GetMenu
DeleteMenu
EnableMenuItem
CheckMenuItem
DestroyWindow
SetWindowTextA
VkKeyScanA
GetWindow
GetSystemMetrics
TranslateMessage
IsDlgButtonChecked
MoveWindow
DestroyMenu
InsertMenuA
CreateMenu
GetWindowTextA
CreateWindowExA
TrackPopupMenu
GetCursorPos
GetMenuItemCount
GetSubMenu
SetMenu
LoadMenuA
LoadStringA
CharUpperA
GetDesktopWindow
MessageBoxA
LoadBitmapA
PtInRect
ShowScrollBar
InvalidateRgn
UpdateWindow
ReleaseDC
GetDC
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
ScreenToClient
CharNextW
RegisterClassExA
LoadIconA
LoadImageA
IsRectEmpty
SetRectEmpty
SystemParametersInfoA
EqualRect
IsZoomed
RegisterWindowMessageA
SetProcessDefaultLayout
GetProcessDefaultLayout
LoadCursorA
LoadAcceleratorsA
PostQuitMessage
DefWindowProcA
DispatchMessageA
shell32
SHGetSpecialFolderPathA
Sections
.text Size: 227KB - Virtual size: 226KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 5KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ