Static task
static1
Behavioral task
behavioral1
Sample
b6e668902680afb4a26a5041e81876c1150d9793575a9bc2014c9c8f689d9882.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b6e668902680afb4a26a5041e81876c1150d9793575a9bc2014c9c8f689d9882.exe
Resource
win10v2004-20220901-en
General
-
Target
b6e668902680afb4a26a5041e81876c1150d9793575a9bc2014c9c8f689d9882
-
Size
441KB
-
MD5
5f6400513e74920bfa2e73597af1515b
-
SHA1
ca14ffe97e47e3640b0cf8f3d2d18d0f42315511
-
SHA256
b6e668902680afb4a26a5041e81876c1150d9793575a9bc2014c9c8f689d9882
-
SHA512
ede3e27260904cd31172c867bafe1c2cec1598eab14ce73b3e129b073627ddda98f25b54187dd0dfb11eeeb18cdecc4afb041ca37ae05556d366b14d88da896f
-
SSDEEP
6144:d6xt65Swf3jNpOkH8dVGq0K8EQwwYlpK1GLXtq2jjj1LiR+QMF2HwnQj8fN2ssV:EiSU3jNpOJ0juwYtA2b15rFypMN2z
Malware Config
Signatures
Files
-
b6e668902680afb4a26a5041e81876c1150d9793575a9bc2014c9c8f689d9882.exe windows x86
0c19a81b3347c94866206b2aa57f0842
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
wcslen
__CxxFrameHandler
free
malloc
wcscpy
_wcsicmp
_purecall
__RTDynamicCast
wcscmp
swscanf
wcschr
wcsrchr
wcsstr
_wcsnicmp
_initterm
_adjust_fdiv
??1type_info@@UAE@XZ
?terminate@@YAXXZ
__dllonexit
_onexit
_except_handler3
msvcp60
??0_Lockit@std@@QAE@XZ
??1_Lockit@std@@QAE@XZ
atl
ord15
ord22
ord18
ord21
ord16
ord32
advapi32
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
FreeSid
LookupAccountSidW
RegDeleteValueW
RegOpenKeyW
RegEnumKeyW
RegEnumKeyExW
RegDeleteKeyW
LookupAccountNameW
mpr
WNetGetUniversalNameW
ole32
CoInitialize
StringFromGUID2
CoGetMalloc
StringFromCLSID
CoTaskMemFree
CoCreateInstance
CoTaskMemAlloc
CreateStreamOnHGlobal
ReleaseStgMedium
oleaut32
SysAllocString
SysFreeString
VariantClear
VariantInit
shell32
SHGetMalloc
SHBrowseForFolderW
SHGetPathFromIDListW
shlwapi
PathCompactPathW
PathIsUNCW
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.upx Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.upack Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.aspack Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.usaa Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.uaan Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.uaak Size: 407KB - Virtual size: 408KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.uaaj Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.uaah Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 11KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ