Static task
static1
Behavioral task
behavioral1
Sample
6e893653c7423df0539e52768c35e717.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6e893653c7423df0539e52768c35e717.exe
Resource
win10v2004-20221111-en
General
-
Target
6e893653c7423df0539e52768c35e717.exe
-
Size
1021KB
-
MD5
6e893653c7423df0539e52768c35e717
-
SHA1
8491cab5811f09638e146e1dc4526c0e9effca43
-
SHA256
6bcb3820bfc04a26be416d94d12312eac70f48dd6b354a3e9010606167198e5a
-
SHA512
496a2ccd996772c69cc8b28e9042f861df29109b47b26c166a52f59a4bece780c7efa5367618785672f378ae11fa6e8939cf0633bd17035c11284dce61bb16ba
-
SSDEEP
24576:TH0/iZ6LO8xC3k0IuHmzfXLunDAQOWIhafNnKDP2:D0/DvDruUigWi
Malware Config
Signatures
Files
-
6e893653c7423df0539e52768c35e717.exe.exe windows x86
9e625a9baa60a24433313f8e16d3b887
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetConsoleAliasA
AreFileApisANSI
SetHandleCount
GetProcessPriorityBoost
GetModuleHandleW
CreateDirectoryExW
GetLogicalDriveStringsW
ReadConsoleInputW
FindNextVolumeMountPointW
AddAtomA
CopyFileExA
CallNamedPipeW
GetCurrentDirectoryW
GetSystemDirectoryA
CreateMailslotW
TlsGetValue
GetProcAddress
GetModuleHandleA
LocalAlloc
GetCommandLineA
InterlockedIncrement
ConvertDefaultLocale
GetConsoleMode
FindFirstVolumeA
LocalFree
EnumDateFormatsW
ReadConsoleOutputA
ExitProcess
BuildCommDCBAndTimeoutsW
CreateActCtxA
GlobalFindAtomW
CopyFileW
VerSetConditionMask
CreateMutexW
DeactivateActCtx
GetDiskFreeSpaceA
MoveFileA
SetEvent
MoveFileExW
OpenMutexA
FindResourceW
SetFileTime
SetFilePointer
FindFirstFileA
FreeEnvironmentStringsA
EnumResourceLanguagesA
InterlockedCompareExchange
InterlockedExchangeAdd
GetTickCount
GlobalFlags
LoadLibraryA
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetLastError
HeapFree
CloseHandle
EnterCriticalSection
LeaveCriticalSection
HeapAlloc
Sleep
WriteFile
GetStdHandle
GetModuleFileNameA
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetFileType
GetStartupInfoA
DeleteCriticalSection
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
VirtualAlloc
HeapReAlloc
SetStdHandle
WideCharToMultiByte
GetConsoleCP
FlushFileBuffers
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
InitializeCriticalSectionAndSpinCount
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapSize
CreateFileA
user32
CharToOemBuffW
advapi32
InitiateSystemShutdownA
Sections
.text Size: 50KB - Virtual size: 50KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 875KB - Virtual size: 1013KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 94KB - Virtual size: 93KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ