Static task
static1
Behavioral task
behavioral1
Sample
c6d18f5387bb5f5d2ce888d0a479edd3a4c9c586474fd5993569f57373d0005a.exe
Resource
win7-20240221-en
General
-
Target
c6d18f5387bb5f5d2ce888d0a479edd3a4c9c586474fd5993569f57373d0005a
-
Size
310KB
-
MD5
a8cb8aed839878d4ca028c8f43bbfab3
-
SHA1
f428060f924c5e735bb53904228e46cf9430518d
-
SHA256
c6d18f5387bb5f5d2ce888d0a479edd3a4c9c586474fd5993569f57373d0005a
-
SHA512
290d6886e805c7d7058b7b132606d79c1b730b2a04b620deb24d014e840c0ba976e6e9dd0c7b4034d8a92042f30932bca277f826baa65660c260f70ff5d3cc4f
-
SSDEEP
6144:/ta+P2wEoCoF5UBnI6AqqDLuN3X/rcfBeqlLf2ZJrUrecPL:/kZwnCwUW8qnuZv4p2ZJYaK
Malware Config
Signatures
Files
-
c6d18f5387bb5f5d2ce888d0a479edd3a4c9c586474fd5993569f57373d0005a.exe windows:4 windows x86 arch:x86
f43f9d195891206936b3c8ec5d616fdc
Code Sign
01Certificate
IssuerO=Internet Widgits Pty Ltd,ST=p,C=AUNot Before25-11-2016 19:11Not After25-11-2018 19:11SubjectO=Internet Widgits Pty Ltd,ST=Some-State,C=pG93:8f:27:ad:7c:f1:6e:53:c0:93:b3:a5:bd:4e:13:eb:92:60:66:fcSigner
Actual PE Digest93:8f:27:ad:7c:f1:6e:53:c0:93:b3:a5:bd:4e:13:eb:92:60:66:fcDigest Algorithmsha1PE Digest MatchestrueHeaders
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersion
FileTimeToSystemTime
FileTimeToLocalFileTime
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
FreeLibrary
GetProcessVersion
GetCPInfo
GetOEMCP
RtlUnwind
RaiseException
ExitProcess
TerminateProcess
HeapFree
HeapAlloc
HeapReAlloc
HeapSize
GetACP
GetTimeZoneInformation
SetUnhandledExceptionFilter
UnhandledExceptionFilter
FreeEnvironmentStringsA
SetLastError
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
IsValidLocale
IsValidCodePage
GetLocaleInfoA
EnumSystemLocalesA
GetUserDefaultLCID
GetVersionExA
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetLocaleInfoW
WritePrivateProfileStringA
GlobalFlags
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
GlobalHandle
GlobalUnlock
GlobalFree
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalFree
LocalAlloc
GetFileTime
GetFileSize
GetFileAttributesA
lstrcatA
SetErrorMode
GetModuleFileNameA
InterlockedExchange
GetFullPathNameA
lstrcpynA
GetVolumeInformationA
FindFirstFileA
FindClose
lstrcpyA
LoadLibraryA
GetProcAddress
SetEndOfFile
UnlockFile
LockFile
CloseHandle
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
CreateFileA
GetCurrentProcess
DuplicateHandle
GetLastError
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
InterlockedDecrement
InterlockedIncrement
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
GetCommandLineA
GetModuleHandleA
FreeEnvironmentStringsW
Sleep
user32
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
SetFocus
GetSysColor
MapWindowPoints
LoadIconA
ShowWindow
LoadCursorA
GetSysColorBrush
DestroyMenu
DestroyWindow
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetDlgItem
SetForegroundWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
LoadStringA
GrayStringA
DrawTextA
TabbedTextOutA
ReleaseDC
GetDC
GetMenuItemCount
UnhookWindowsHookEx
GetLastActivePopup
IsWindowEnabled
MessageBoxA
EnableWindow
SetWindowTextA
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
PtInRect
GetWindowLongA
GetClassNameA
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetParent
GetNextDlgTabItem
SetCursor
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
SendMessageA
GetKeyState
CallNextHookEx
ValidateRect
PostQuitMessage
PostMessageA
GetForegroundWindow
DefWindowProcA
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
GetSystemMetrics
CharUpperA
wsprintfA
GetWindowTextA
gdi32
SetTextColor
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
GetDeviceCaps
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
GetObjectA
SetBkColor
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
CreateBitmap
DeleteObject
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
comctl32
ord17
Sections
.text Size: 112KB - Virtual size: 110KB
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 4KB - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 136KB - Virtual size: 134KB
IMAGE_SCN_MEM_READ
.tls Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ