Static task
static1
Behavioral task
behavioral1
Sample
6d4d86b4f60c18c239fb98bc78ea5db75711bc057ae6ee680ba158c7258365f5.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
6d4d86b4f60c18c239fb98bc78ea5db75711bc057ae6ee680ba158c7258365f5.exe
Resource
win10v2004-20230220-en
General
-
Target
6d4d86b4f60c18c239fb98bc78ea5db75711bc057ae6ee680ba158c7258365f5
-
Size
2.5MB
-
MD5
c7eba5aab20e75a79f8dfc36ab6bd980
-
SHA1
4da19ad2ce0d64825da31cf464c9edfc29df9be5
-
SHA256
6d4d86b4f60c18c239fb98bc78ea5db75711bc057ae6ee680ba158c7258365f5
-
SHA512
ca725751e7d93c669d370d56acff0a5f8a704f70818f87371a635d6eade6f7d43fd55ec98e795b4ffb43c9d9037eace99342dc57576b01f98907710575e200ab
-
SSDEEP
49152:5izEvgVNmIX2giH03ERZA+LS+8RKPP2vr4LtZ3JtYgpdcsF5:5izEvguIXbiH/XT8kWvr4Lw6
Malware Config
Signatures
Files
-
6d4d86b4f60c18c239fb98bc78ea5db75711bc057ae6ee680ba158c7258365f5.exe windows x86
2fd0ac0de5021a5fdeac3edc5a1387d5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFullPathNameW
GetCurrentDirectoryW
GetVersionExW
GetModuleHandleW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
GetLongPathNameW
WriteFile
GetTempPathW
CreateFileW
GetFileAttributesW
DeleteFileW
CopyFileW
GetLastError
DecodePointer
HeapReAlloc
HeapSize
RaiseException
InitializeCriticalSectionAndSpinCount
GetFileSize
ReadFile
MultiByteToWideChar
WideCharToMultiByte
GetPrivateProfileIntW
LoadLibraryW
GetModuleFileNameW
ReleaseMutex
CreateMutexW
FindClose
lstrcpyW
FindFirstFileW
FindNextFileW
MoveFileExW
GetEnvironmentVariableW
CreateDirectoryW
FileTimeToSystemTime
LocalFree
GetSystemInfo
GetSystemDirectoryW
GetVolumeInformationW
GlobalAlloc
GlobalFree
LocalAlloc
OpenProcess
DeleteCriticalSection
Process32FirstW
Process32NextW
DeviceIoControl
OutputDebugStringA
SetPriorityClass
EncodePointer
RtlUnwind
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
ExitProcess
GetStdHandle
GetACP
GetStringTypeW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileType
GetConsoleMode
ReadConsoleW
SetFilePointerEx
FindFirstFileExW
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetConsoleCtrlHandler
OutputDebugStringW
SetStdHandle
GetConsoleCP
GetTimeZoneInformation
FlushFileBuffers
WriteConsoleW
SetEndOfFile
FreeLibraryAndExitThread
GetTickCount
ExitThread
SystemTimeToTzSpecificLocalTime
GetDriveTypeW
SystemTimeToFileTime
GetSystemTime
ReadConsoleA
SetConsoleMode
ConvertThreadToFiber
ConvertFiberToThread
CreateFiber
DeleteFiber
SwitchToFiber
VerifyVersionInfoA
GetSystemDirectoryA
GetModuleHandleA
VerSetConditionMask
ExpandEnvironmentStringsA
CreateThread
Sleep
CreateEventW
WaitForSingleObject
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
MapViewOfFile
CloseHandle
FlushViewOfFile
UnmapViewOfFile
OpenFileMappingW
IsBadReadPtr
FreeLibrary
GetProcessHeap
GetProcAddress
HeapAlloc
GetNativeSystemInfo
LoadLibraryA
VirtualAlloc
PeekNamedPipe
WaitForMultipleObjects
SleepEx
FormatMessageA
VirtualFree
SetLastError
HeapFree
VirtualProtect
GetPrivateProfileStringW
GetModuleHandleExW
WritePrivateProfileStringW
CreateToolhelp32Snapshot
user32
LoadStringW
GetProcessWindowStation
wsprintfW
GetUserObjectInformationW
GetLastInputInfo
MessageBoxW
ole32
CoInitialize
CoUninitialize
CoCreateInstance
shlwapi
PathFileExistsW
advapi32
ReportEventW
CryptGenRandom
DeregisterEventSource
RegisterEventSourceW
CryptAcquireContextW
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
DuplicateTokenEx
LookupAccountSidW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
GetTokenInformation
OpenProcessToken
RegOpenKeyW
RegEnumKeyW
ImpersonateLoggedOnUser
RevertToSelf
RegSetValueExW
RegQueryValueExW
CryptReleaseContext
shell32
SHGetSpecialFolderPathW
SHGetFolderPathW
wininet
InternetCloseHandle
InternetQueryOptionW
HttpQueryInfoW
InternetOpenW
InternetSetOptionW
InternetOpenUrlW
InternetReadFile
wldap32
ord143
ord46
ord211
ord60
ord50
ord41
ord22
ord26
ord27
ord32
ord33
ord35
ord79
ord30
ord200
ord301
ws2_32
WSACleanup
WSAGetLastError
__WSAFDIsSet
select
gethostname
ioctlsocket
listen
accept
sendto
recvfrom
freeaddrinfo
getaddrinfo
WSAIoctl
socket
setsockopt
ntohs
htons
getsockopt
getsockname
getpeername
connect
WSAStartup
bind
send
recv
WSASetLastError
closesocket
Sections
.text Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 522KB - Virtual size: 522KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 432B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 171KB - Virtual size: 170KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 192KB - Virtual size: 191KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE