Static task
static1
Behavioral task
behavioral1
Sample
6db4017edf0bf9c78fedc41550f71882e804f9483555d3edd3c7e697067373c1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6db4017edf0bf9c78fedc41550f71882e804f9483555d3edd3c7e697067373c1.exe
Resource
win10v2004-20221111-en
General
-
Target
6db4017edf0bf9c78fedc41550f71882e804f9483555d3edd3c7e697067373c1
-
Size
293KB
-
MD5
218bdfbed4f5a487499c6635c8c75b40
-
SHA1
c8a3294a5dc52fd4936960192317b964e70b5fe7
-
SHA256
6db4017edf0bf9c78fedc41550f71882e804f9483555d3edd3c7e697067373c1
-
SHA512
dadfbcb2a457ef8c5bfd806554af3cb1d3bc527178084a79158e4bce6872ddfccc2401359a47b1e0fd6ecfc72d12486c66f6fdf49ceb84b8c63cfe6bc08a98e4
-
SSDEEP
6144:QNjoyw8lF5k4TTxyxp066wKwmpM5x02gtM8zD7NX1U3EWDM:aHweLyxp0xvwm+E1zDjU3E
Malware Config
Signatures
Files
-
6db4017edf0bf9c78fedc41550f71882e804f9483555d3edd3c7e697067373c1.exe windows x86
a693dfd428731008bb1b22c1db06bb8d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteConsoleA
HeapDestroy
GetModuleHandleA
GetCommandLineW
OpenEventW
FindVolumeClose
GetEnvironmentVariableW
FindResourceExW
CloseHandle
ExitProcess
HeapCreate
GetStartupInfoA
SetEvent
CloseHandle
ReleaseMutex
SuspendThread
GetTickCount
DeleteFileA
GetFileAttributesA
OpenThread
user32
GetCaretPos
DispatchMessageA
FindWindowA
GetClassInfoA
DispatchMessageA
GetIconInfo
PeekMessageA
CallWindowProcW
IsZoomed
GetKeyState
GetWindowLongA
SetFocus
GetSysColor
htui
HTUI_ColorAdjustment
HTUI_ColorAdjustment
HTUI_ColorAdjustment
HTUI_ColorAdjustment
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 428KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 287KB - Virtual size: 286KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ