Static task
static1
Behavioral task
behavioral1
Sample
6eee114a36f811cd6cbcf06066ab380522b17dd4fdd44.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6eee114a36f811cd6cbcf06066ab380522b17dd4fdd44.exe
Resource
win10v2004-20221111-en
General
-
Target
6eee114a36f811cd6cbcf06066ab380522b17dd4fdd44.exe
-
Size
796KB
-
MD5
f6dbc78ddf0f87e29d0f7fcf6e9d7f75
-
SHA1
82ace216270342a162e5c9ce777b83ae490486e7
-
SHA256
6eee114a36f811cd6cbcf06066ab380522b17dd4fdd4480dd79c44f3855fd078
-
SHA512
f00e82a1d386607780fb4a1973ff7e946f3b3a73c4c596fd63e73bcd974b0953ae002c3cb13d7a18be95df51562681cdb73bf1f8251f7ca138ff5d8e90f939f6
-
SSDEEP
24576:6AWPfrKoCcLIyaxbSoFrW6BxdLCDYJmRz4CF6:wPJlapSOr7xQSmRz16
Malware Config
Signatures
Files
-
6eee114a36f811cd6cbcf06066ab380522b17dd4fdd44.exe.exe windows x86
9076ebdfe68716cd93d7fb2ff571e34b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetPriorityClass
SetLocalTime
InterlockedIncrement
GetConsoleAliasA
GetCurrentProcess
SetHandleInformation
GetWindowsDirectoryA
GetGeoInfoW
GetConsoleAliasExesW
SetCommTimeouts
FindResourceExA
GlobalAlloc
DnsHostnameToComputerNameW
EnumSystemCodePagesA
WriteConsoleW
ReadFile
GetDevicePowerState
IsBadStringPtrA
LCMapStringA
SetLastError
GetProcAddress
FindVolumeMountPointClose
VirtualAlloc
LoadLibraryA
WriteConsoleA
GetCommMask
AddAtomA
SetCommMask
FoldStringA
SetNamedPipeHandleState
GetModuleHandleA
BuildCommDCBA
GetCPInfoExA
EndUpdateResourceA
GetVolumeNameForVolumeMountPointW
EnumResourceLanguagesW
LCMapStringW
GetStringTypeW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetModuleHandleW
Sleep
ExitProcess
GetLastError
WriteFile
GetStdHandle
GetModuleFileNameA
TerminateProcess
IsDebuggerPresent
HeapAlloc
HeapFree
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
InterlockedDecrement
HeapSize
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
RtlUnwind
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSectionAndSpinCount
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetLocaleInfoA
WideCharToMultiByte
GetStringTypeA
MultiByteToWideChar
user32
GetMenuItemID
LoadMenuA
ScreenToClient
Sections
.text Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 589KB - Virtual size: 680KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.hagejij Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dadi Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.boyizi Size: 1024B - Virtual size: 723B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 152KB - Virtual size: 152KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ