Static task
static1
Behavioral task
behavioral1
Sample
6c6ee035cbf8dfdc827139c19506ec0c3cf31591133f2917edebaaa62867d585.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6c6ee035cbf8dfdc827139c19506ec0c3cf31591133f2917edebaaa62867d585.exe
Resource
win10v2004-20221111-en
General
-
Target
6c6ee035cbf8dfdc827139c19506ec0c3cf31591133f2917edebaaa62867d585
-
Size
279KB
-
MD5
c0129d0241f049ce25c9f75b7c01bdd1
-
SHA1
1c2ef65bc984b6b842bf94099889021cd0f6302d
-
SHA256
6c6ee035cbf8dfdc827139c19506ec0c3cf31591133f2917edebaaa62867d585
-
SHA512
acb87badf35b2615b020de698a4f14690c98293c376e3b9d67e994c72551e5f23e4c04542c4ec120d2819a1c2f272fce4de147e712b59a4f0963b8fd12cdb251
-
SSDEEP
6144:3cub7X69gQmgWY/3B6U8ime3tpPH7zlknQwic8caxBSg:nbb6eQm/Y/3znP99H7zyQwxsxBSg
Malware Config
Signatures
Files
-
6c6ee035cbf8dfdc827139c19506ec0c3cf31591133f2917edebaaa62867d585.exe windows x86
74cdc975eca005d3bd1b0f500f3d9c43
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CopyFileW
CreateDirectoryA
CreateDirectoryW
CreateEventA
CreateEventW
CreateFileA
CreateFileW
CreateMutexA
CreateMutexW
CreateProcessA
CreateProcessW
CreateThread
DeleteCriticalSection
DeleteFileA
DeleteFileW
DeviceIoControl
EnterCriticalSection
ExpandEnvironmentStringsA
ExpandEnvironmentStringsW
FileTimeToSystemTime
FindClose
FindFirstFileA
FindFirstFileW
FindNextFileA
FindNextFileW
FreeLibrary
GetCurrentDirectoryA
GetCurrentDirectoryW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDriveTypeA
GetDriveTypeW
GetExitCodeProcess
GetExitCodeThread
GetFileAttributesA
GetFileAttributesW
GetFileTime
GetLastError
GetLocaleInfoA
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetPrivateProfileStringA
GetProcAddress
GetProcessHeap
GetProfileStringA
GetProfileStringW
CopyFileA
GetSystemDefaultLangID
GetSystemDirectoryA
GetSystemDirectoryW
GetSystemTimeAsFileTime
GetTickCount
GetUserDefaultLangID
GetVersion
GetVersionExA
GetWindowsDirectoryA
HeapAlloc
HeapFree
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
LeaveCriticalSection
MapViewOfFile
MultiByteToWideChar
OpenEventA
OpenEventW
QueryDosDeviceA
QueryDosDeviceW
QueryPerformanceCounter
ReadFile
ReleaseMutex
RemoveDirectoryA
RemoveDirectoryW
ResetEvent
SetCurrentDirectoryA
SetCurrentDirectoryW
SetEndOfFile
SetErrorMode
SetEvent
SetFilePointer
SetLastError
SetUnhandledExceptionFilter
Sleep
TerminateProcess
UnhandledExceptionFilter
UnmapViewOfFile
WaitForMultipleObjects
WaitForSingleObject
WideCharToMultiByte
WriteFile
WriteProfileStringA
WriteProfileStringW
lstrcpynW
lstrlenA
lstrlenW
CompareStringA
CloseHandle
GetCommandLineW
GetStartupInfoA
VirtualAlloc
user32
LoadCursorA
LoadIconA
gdi32
GetStockObject
advapi32
RegOpenKeyExW
RegCloseKey
Sections
.text Size: 271KB - Virtual size: 270KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 552B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ