Static task
static1
Behavioral task
behavioral1
Sample
d6e150b5ee037595dcbfd4b5cb4e58960b618a3da4707e85b2beee7af4eff708.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d6e150b5ee037595dcbfd4b5cb4e58960b618a3da4707e85b2beee7af4eff708.exe
Resource
win10v2004-20220812-en
General
-
Target
d6e150b5ee037595dcbfd4b5cb4e58960b618a3da4707e85b2beee7af4eff708
-
Size
397KB
-
MD5
c46931485c417ab9d5a760d32ccd5639
-
SHA1
9034dd43837bd3d95da2ec9955d2b063486c3125
-
SHA256
d6e150b5ee037595dcbfd4b5cb4e58960b618a3da4707e85b2beee7af4eff708
-
SHA512
06af22bf46aae98eac35a2ebbe5f153dab4ec132d812df7ac806313233e487918836f11d6285e7b0fb8c3e83207af3b0f7701118270102440f93fb835aa17a56
-
SSDEEP
3072:nLHdRtOEhbNlcCcZprJGMNUuvpats93aRI8OFrD:L9RtOEVNlcCcZFHNU0ac3qzOFrD
Malware Config
Signatures
Files
-
d6e150b5ee037595dcbfd4b5cb4e58960b618a3da4707e85b2beee7af4eff708.exe windows x86
e19abed06a01c8862b086b28cd84cb01
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
crlutl
?GetInst@IGLB_UILanguageW@@SAAAV1@XZ
GetAppSkinSettingData
mfc80u
ord1178
ord1182
ord764
ord776
ord1079
ord265
ord577
ord293
ord283
ord280
ord268
ord746
ord5398
ord2460
msvcr80
_controlfp_s
_invoke_watson
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
?terminate@@YAXXZ
_decode_pointer
_onexit
_lock
__dllonexit
_unlock
_except_handler4_common
__set_app_type
_snwprintf
__CxxFrameHandler3
memset
_CxxThrowException
_amsg_exit
__wgetmainargs
_cexit
_exit
_XcptFilter
exit
_wcmdln
_initterm
_initterm_e
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_encode_pointer
_configthreadlocale
kernel32
InitializeCriticalSection
GetSystemTimeAsFileTime
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStartupInfoW
InterlockedCompareExchange
Sleep
EnterCriticalSection
LeaveCriticalSection
InterlockedExchange
SetUnhandledExceptionFilter
LoadLibraryW
FreeLibrary
GlobalFindAtomW
GlobalDeleteAtom
GetVersion
GetFileAttributesW
GetProcAddress
WaitForSingleObject
GetModuleHandleW
GetModuleHandleA
GetCurrentProcessId
CreateEventW
GetModuleFileNameW
CreateProcessW
CloseHandle
DeleteCriticalSection
user32
DdeNameService
DdeUninitialize
PostThreadMessageW
PeekMessageW
TranslateMessage
DispatchMessageW
MsgWaitForMultipleObjectsEx
gdi32
DeleteDC
ole32
CoInitialize
CoUninitialize
gdiplus
GdiplusShutdown
Sections
.text Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 292KB - Virtual size: 289KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.erdata Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE