Static task
static1
Behavioral task
behavioral1
Sample
6db6a942b68f99cc2e1da084aca2e7ee5e498dc02b4f160e16b6baf4b75ba11a.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
6db6a942b68f99cc2e1da084aca2e7ee5e498dc02b4f160e16b6baf4b75ba11a.exe
Resource
win10v2004-20230220-en
General
-
Target
6db6a942b68f99cc2e1da084aca2e7ee5e498dc02b4f160e16b6baf4b75ba11a
-
Size
2.9MB
-
MD5
9a77d6ce8f51b8d5a7c80f2554c87b35
-
SHA1
489de10399aa90cdc8eb0ecc67892f8912acb243
-
SHA256
6db6a942b68f99cc2e1da084aca2e7ee5e498dc02b4f160e16b6baf4b75ba11a
-
SHA512
7454423471647f45747cc3302292db8b2de23acdfe84186fcd18b84e5e993907cac4000929aadeeee37faf2c0054d1a093768719008ef4dd0204ece535ad0826
-
SSDEEP
49152:81zAwjaqt5c2LTBPqDs65Ux2kO6ue3Ar1hk1J4r1l6XD4djoZCOm01:1/x5Ux7MqJmSXyGe01
Malware Config
Signatures
Files
-
6db6a942b68f99cc2e1da084aca2e7ee5e498dc02b4f160e16b6baf4b75ba11a.exe windows x64
27596a22c84234fb3be45d2300f1de59
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
InitializeCriticalSectionEx
DeleteCriticalSection
GetModuleFileNameA
LoadLibraryExA
FindClose
FindFirstFileA
lstrcpynA
lstrcatA
GetCurrentProcessId
GetSystemTime
GetLocalTime
lstrcpyA
CreateFileA
CloseHandle
DeviceIoControl
GetVersionExA
lstrcmpiA
lstrlenA
TerminateProcess
OpenProcess
GetFileSize
ReadFile
SetFilePointer
GetVersion
GetTickCount
LoadResource
LockResource
SizeofResource
FindResourceA
WriteFile
WaitForSingleObject
CreateProcessA
GetTempPathA
GetDiskFreeSpaceA
GetDriveTypeA
SetErrorMode
ReleaseSemaphore
GetSystemDirectoryA
FreeLibrary
GlobalAlloc
GlobalUnlock
LocalLock
LocalFree
CreateSemaphoreA
GetLogicalDriveStringsA
GetPrivateProfileStringA
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
GetLastError
RaiseException
DecodePointer
IsBadReadPtr
LoadLibraryA
GetProcAddress
EncodePointer
RtlLookupFunctionEntry
RtlUnwindEx
GetModuleHandleA
IsDebuggerPresent
IsProcessorFeaturePresent
RtlPcToFileHeader
DuplicateHandle
GetCommandLineA
ExitProcess
GetModuleHandleExW
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
SetLastError
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
GetConsoleMode
ReadConsoleW
RtlCaptureContext
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
Sleep
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
GetTimeZoneInformation
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetStdHandle
GetFileType
GetExitCodeProcess
CreatePipe
GetModuleFileNameW
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
LoadLibraryExW
SetStdHandle
FlushFileBuffers
GetConsoleCP
SetFilePointerEx
CompareStringW
LCMapStringW
GetStringTypeW
GetFileAttributesExW
OutputDebugStringW
WriteConsoleW
CreateFileW
SetEnvironmentVariableA
SetEndOfFile
LoadLibraryW
GlobalMemoryStatus
GetVersionExW
VirtualProtectEx
VirtualFree
VirtualAlloc
GetSystemInfo
GetSystemTimeAsFileTime
GetCurrentProcess
user32
GetUserObjectInformationW
GetProcessWindowStation
GetDesktopWindow
wsprintfA
LoadCursorA
SetCursor
MessageBoxA
MessageBoxW
advapi32
RegOpenKeyExA
ReportEventW
DeregisterEventSource
RegCloseKey
RegEnumKeyExA
RegisterEventSourceW
netapi32
Netbios
Sections
.text Size: 403KB - Virtual size: 402KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 137KB - Virtual size: 136KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.1MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ