Static task
static1
Behavioral task
behavioral1
Sample
6bcd75c58ad1f74ec41dd068edd168c867c9854dcd60baff655946ab8051888c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6bcd75c58ad1f74ec41dd068edd168c867c9854dcd60baff655946ab8051888c.exe
Resource
win10v2004-20221111-en
General
-
Target
6bcd75c58ad1f74ec41dd068edd168c867c9854dcd60baff655946ab8051888c
-
Size
2.8MB
-
MD5
8e885b2b8558155456954fe179610bd2
-
SHA1
5cd5d86eeeadc93f232aba40c5ceb3eac50b6ece
-
SHA256
6bcd75c58ad1f74ec41dd068edd168c867c9854dcd60baff655946ab8051888c
-
SHA512
6f9f262e09b182ab9650ea99489f735f748262e4eb7b0cfe14bf976638e84293b9e694d1b4c6bee0c616ce52e21e242093d0001f6b20ebe045a4d0a305a98dfd
-
SSDEEP
49152:GiR24aq3UQi6xSnSDSmxnuzzkZP3tMiVfPCW+jAfv/ZnhU6E:GiY47kQi6MnH6PiGSW+y
Malware Config
Signatures
Files
-
6bcd75c58ad1f74ec41dd068edd168c867c9854dcd60baff655946ab8051888c.exe windows x86
e76905fc42b0190868874bc0e365850d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateThread
DeleteCriticalSection
CreateEventW
WaitForSingleObject
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
MapViewOfFile
FlushViewOfFile
UnmapViewOfFile
OpenFileMappingW
IsBadReadPtr
GetProcessHeap
HeapAlloc
GetNativeSystemInfo
LoadLibraryA
UnregisterWaitEx
QueryDepthSList
InterlockedPopEntrySList
ReleaseSemaphore
GetThreadTimes
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
GetVersionExW
LocalAlloc
LocalFree
GetCurrentProcess
GetModuleFileNameW
OutputDebugStringW
ResetEvent
WaitForSingleObjectEx
GetModuleHandleW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
GetLongPathNameW
GetExitCodeProcess
WriteFile
GetTempPathW
GetFileAttributesW
CopyFileW
GetLastError
DecodePointer
HeapReAlloc
HeapSize
RaiseException
InitializeCriticalSectionAndSpinCount
GetFileSize
ReadFile
MultiByteToWideChar
WideCharToMultiByte
GetPrivateProfileIntW
GlobalAlloc
GlobalFree
lstrcpyW
CreateProcessW
FindClose
GetEnvironmentVariableW
RemoveDirectoryW
FindFirstFileW
FindNextFileW
MoveFileExW
GetSystemInfo
ReleaseMutex
CreateMutexW
GetVolumeInformationW
OutputDebugStringA
SetPriorityClass
EncodePointer
RtlUnwind
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
InterlockedPushEntrySList
InterlockedFlushSList
ExitProcess
GetModuleHandleExW
GetStdHandle
GetACP
GetCurrentThread
GetStringTypeW
GetFileType
WriteConsoleW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetConsoleMode
ReadConsoleW
SetFilePointerEx
FindFirstFileExW
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetConsoleCtrlHandler
SetStdHandle
GetConsoleCP
GetTimeZoneInformation
FlushFileBuffers
SetEndOfFile
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
SwitchToThread
SignalObjectAndWait
CreateTimerQueue
GetFullPathNameW
GetCurrentDirectoryW
SystemTimeToTzSpecificLocalTime
GetDriveTypeW
FreeLibraryAndExitThread
ExitThread
SystemTimeToFileTime
GetSystemTime
ReadConsoleA
VirtualAlloc
lstrlenW
VirtualFree
SetLastError
HeapFree
VirtualProtect
GetPrivateProfileStringW
WritePrivateProfileStringW
GetTickCount
FreeLibrary
GetProcAddress
LoadLibraryW
CloseHandle
Process32FirstW
DeleteFileW
SetConsoleMode
ConvertThreadToFiber
ConvertFiberToThread
CreateFiber
DeleteFiber
SwitchToFiber
VerifyVersionInfoA
GetSystemDirectoryA
GetModuleHandleA
FileTimeToSystemTime
SetEvent
Process32NextW
Sleep
CreateToolhelp32Snapshot
OpenProcess
GetSystemDirectoryW
CreateFileW
CreateDirectoryW
DeviceIoControl
VerSetConditionMask
ExpandEnvironmentStringsA
PeekNamedPipe
WaitForMultipleObjects
SleepEx
FormatMessageA
TryEnterCriticalSection
DuplicateHandle
user32
LoadStringW
wsprintfW
GetProcessWindowStation
GetUserObjectInformationW
MessageBoxW
GetLastInputInfo
PostMessageW
FindWindowW
advapi32
RegCreateKeyExW
RegisterEventSourceW
DeregisterEventSource
CryptGenRandom
RegQueryValueExW
RegOpenKeyW
CreateProcessAsUserW
ImpersonateLoggedOnUser
RevertToSelf
DuplicateTokenEx
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetTokenInformation
RegSetValueExW
ReportEventW
LookupAccountSidW
GetTokenInformation
RegOpenKeyExW
CryptAcquireContextW
CryptReleaseContext
RegCloseKey
RegEnumKeyW
RegDeleteKeyW
OpenProcessToken
shell32
SHGetFolderPathW
SHGetSpecialFolderLocation
SHChangeNotify
SHGetSpecialFolderPathW
SHGetPathFromIDListW
ole32
CoCreateInstance
CoUninitialize
CoTaskMemFree
CoInitialize
shlwapi
PathFileExistsW
SHDeleteKeyW
SHDeleteValueW
SHGetValueW
SHSetValueW
userenv
DestroyEnvironmentBlock
CreateEnvironmentBlock
wininet
InternetSetOptionW
InternetOpenW
HttpQueryInfoW
InternetQueryOptionW
InternetReadFile
InternetCloseHandle
InternetOpenUrlW
wldap32
ord143
ord211
ord46
ord60
ord50
ord41
ord22
ord26
ord27
ord32
ord33
ord35
ord79
ord30
ord200
ord301
ws2_32
WSAStartup
WSACleanup
recv
send
WSAGetLastError
__WSAFDIsSet
select
WSASetLastError
bind
closesocket
connect
getpeername
getsockname
getsockopt
ioctlsocket
gethostname
htons
ntohs
setsockopt
accept
sendto
socket
WSAIoctl
getaddrinfo
freeaddrinfo
recvfrom
listen
Sections
.text Size: 1.7MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 549KB - Virtual size: 549KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 425KB - Virtual size: 424KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ