Static task
static1
Behavioral task
behavioral1
Sample
a6f6c7ce570d676e24f6a395d16f941ddb2376f0d05a54ea26540cf6e8463c22.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a6f6c7ce570d676e24f6a395d16f941ddb2376f0d05a54ea26540cf6e8463c22.exe
Resource
win10v2004-20221111-en
General
-
Target
a6f6c7ce570d676e24f6a395d16f941ddb2376f0d05a54ea26540cf6e8463c22
-
Size
283KB
-
MD5
7d0d5668b5dd2b53f9a3e7c2cb7b450a
-
SHA1
523ac1e0ab3543d2db368b1dac03fe7489f58b09
-
SHA256
a6f6c7ce570d676e24f6a395d16f941ddb2376f0d05a54ea26540cf6e8463c22
-
SHA512
1f0006157343661d0072dd0df0c35c5f702c10f7aa7a7bd74076111d2e8921e0ef6090f479fe09c6bd0b1dbf83dc38a5bd75efd4308f3604e85aba52b62bbf9f
-
SSDEEP
6144:lfcVt2MLTW/kPwlZ50oApHFSTRsrzUB4OMxC4h0+26Uurx:lkOYTxwlZOoAh0TR6gWFx6+26UuN
Malware Config
Signatures
Files
-
a6f6c7ce570d676e24f6a395d16f941ddb2376f0d05a54ea26540cf6e8463c22.exe windows x86
5c101044ba0431aeac50e3628911b722
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
ChrCmpIW
UrlEscapeA
kernel32
EnumResourceLanguagesA
GetModuleHandleA
LoadLibraryA
SetThreadAffinityMask
GetCommandLineW
lstrcpynW
GetModuleFileNameA
GetSystemDirectoryW
lstrlenA
lstrcpyA
GlobalMemoryStatus
gdi32
GetBitmapBits
GetBkMode
SelectObject
CreateEllipticRgnIndirect
CreateRectRgn
PolyBezier
msvcrt
memset
isprint
atoi
_controlfp
__set_app_type
__p__fmode
__p__commode
putchar
_amsg_exit
_initterm
_ismbblead
_XcptFilter
wcstod
_exit
_cexit
__setusermatherr
__getmainargs
_wtoi
user32
ValidateRect
OemToCharBuffA
GetWindowDC
CreateMenu
IsCharUpperW
MapWindowPoints
OpenDesktopW
ScrollWindowEx
GetMenuItemID
SetWindowPos
FindWindowExW
GetClassInfoA
EnableWindow
FillRect
SendNotifyMessageW
SetWindowPlacement
wsprintfW
Sections
.text Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.ort Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 256KB - Virtual size: 456KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE