Static task
static1
Behavioral task
behavioral1
Sample
6d1b91427ed633b9a80dfb38ac57d6bd5b5e9fd456c86dd9b8d3399384a32d53.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6d1b91427ed633b9a80dfb38ac57d6bd5b5e9fd456c86dd9b8d3399384a32d53.exe
Resource
win10v2004-20220901-en
General
-
Target
6d1b91427ed633b9a80dfb38ac57d6bd5b5e9fd456c86dd9b8d3399384a32d53
-
Size
262KB
-
MD5
33961011c31aad9e8de3f1f11f6accec
-
SHA1
5e0a1da59a41dcc331ac4867c32ab4cea8e75a18
-
SHA256
6d1b91427ed633b9a80dfb38ac57d6bd5b5e9fd456c86dd9b8d3399384a32d53
-
SHA512
024e95974005db8b4bfa69ffe3c4168c3bd67406256f27fdae86187a79c45b9c1b8b259a2ca8c6927e858218ff457376ce3c2a7974104167f6f2a904a9e72dcb
-
SSDEEP
6144:e9HeklkKvTppLthfpBJ6BcLaUQx8ooBOvIEPL:U+kJthfQ83QxpGEPL
Malware Config
Signatures
Files
-
6d1b91427ed633b9a80dfb38ac57d6bd5b5e9fd456c86dd9b8d3399384a32d53.exe windows x86
ba84bb2035beb6fc5d1106fb4bbb23f1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCPInfo
GetOEMCP
SetErrorMode
HeapFree
HeapAlloc
GetCommandLineA
GetStartupInfoA
HeapReAlloc
RtlUnwind
ExitProcess
RaiseException
VirtualAlloc
HeapSize
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
IsValidCodePage
HeapCreate
VirtualFree
GetStdHandle
GetModuleHandleW
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetProcessHeap
GetCurrentProcess
SetEndOfFile
FlushFileBuffers
InterlockedIncrement
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
LocalAlloc
GlobalFlags
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
GetVersionExA
InterlockedDecrement
GetModuleFileNameW
GlobalFree
GlobalUnlock
FormatMessageA
LocalFree
WritePrivateProfileStringA
GlobalAddAtomA
GetCurrentProcessId
GetLastError
SetLastError
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
LoadLibraryA
CompareStringA
InterlockedExchange
GlobalLock
lstrcmpA
GlobalAlloc
FreeLibrary
GetModuleHandleA
GetProcAddress
MultiByteToWideChar
GetFileTime
CreateToolhelp32Snapshot
GetModuleFileNameA
LockResource
Process32Next
CopyFileA
FileTimeToSystemTime
TerminateProcess
SizeofResource
Sleep
WideCharToMultiByte
OpenProcess
Process32First
LoadResource
lstrlenA
FindResourceA
GetCommandLineW
LocalFileTimeToFileTime
DeleteFileA
CloseHandle
GetCurrentDirectoryA
CreateDirectoryA
ReadFile
GetFileAttributesA
WriteFile
SetFileTime
SystemTimeToFileTime
SetFilePointer
FreeEnvironmentStringsA
CreateFileA
user32
UnregisterClassA
LoadCursorA
GetSysColorBrush
ShowWindow
SetWindowTextA
RegisterWindowMessageA
WinHelpA
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetWindowTextA
GetForegroundWindow
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
SetForegroundWindow
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetMenu
SetWindowLongA
SetWindowPos
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetWindow
UnhookWindowsHookEx
DestroyWindow
IsWindow
GetDlgItem
GetSysColor
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetMenuItemID
GetMenuItemCount
GetSubMenu
DestroyMenu
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
GetWindowThreadProcessId
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
MessageBoxA
SetCursor
PostMessageA
PostQuitMessage
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
GetParent
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
IsIconic
LoadIconA
GetClientRect
SendMessageA
GetSystemMetrics
EnableWindow
gdi32
DeleteDC
TextOutA
GetStockObject
RectVisible
PtVisible
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
CreateBitmap
DeleteObject
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
GetDeviceCaps
ExtTextOutA
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
advapi32
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shell32
CommandLineToArgvW
ShellExecuteA
shlwapi
PathFindExtensionA
PathFindFileNameA
PathFileExistsA
oleaut32
VariantClear
VariantChangeType
VariantInit
urlmon
URLDownloadToFileA
Sections
.text Size: 151KB - Virtual size: 150KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ