Static task
static1
Behavioral task
behavioral1
Sample
6cec4135d25466477e35eda6e62b7080N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6cec4135d25466477e35eda6e62b7080N.exe
Resource
win10v2004-20240802-en
General
-
Target
6cec4135d25466477e35eda6e62b7080N.exe
-
Size
244KB
-
MD5
6cec4135d25466477e35eda6e62b7080
-
SHA1
cf85f717c47aee18df90932d62c71e4b4a9a0c57
-
SHA256
e842a1bb52935b4da9156b853c9ad64e9c80e9be99920cd8a9cfb4792b7782df
-
SHA512
a2c4d6cb26d9e85a40736d7f9437a5e6eae80994c89bf997d6f7f246747321c5b184d0480108aca7369a267f092435ab70a0ed6657aeb3af8a4115abf4ddbf7d
-
SSDEEP
6144:vEXlSylvFuWaS54hIAv/QhuA7HY8pPZ0FP6BzxM5EmX:QAylvv5YRwh9HYd61xhmX
Malware Config
Signatures
Files
-
6cec4135d25466477e35eda6e62b7080N.exe.exe windows:4 windows x86 arch:x86
25724a12bec6f765c371201f99ac92be
Code Sign
a0:21:84:d7:75:ec:3c:ea:aa:63:97:b4:86:40:49:d6:b8:9e:37:c4Signer
Actual PE Digesta0:21:84:d7:75:ec:3c:ea:aa:63:97:b4:86:40:49:d6:b8:9e:37:c4Digest Algorithmsha1PE Digest MatchesfalseHeaders
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetNumberFormatA
SetEvent
FindResourceA
GetExpandedNameW
GetFileTime
RaiseException
GetTempPathW
FileTimeToDosDateTime
GetStringTypeA
SearchPathW
GetTempPathA
GetFileAttributesW
SetCalendarInfoA
GetVersion
CreateMailslotW
lstrlenA
EnumTimeFormatsW
VirtualAlloc
EnumCalendarInfoA
GetEnvironmentStringsW
SetLastError
GetCurrentProcess
ConnectNamedPipe
GetModuleFileNameW
lstrcpynA
GetCurrentThread
WaitForSingleObject
GlobalGetAtomNameA
OpenFile
GetTempFileNameW
ReplaceFileA
OpenMutexW
CreateDirectoryA
AddAtomW
GetCurrentProcessId
GetStringTypeW
OpenMutexA
GetLongPathNameA
CreateFiber
GetCurrentDirectoryW
CreateEventA
SystemTimeToFileTime
GlobalDeleteAtom
InitializeCriticalSection
SuspendThread
GetDiskFreeSpaceW
GetCurrentThreadId
CreateThread
SetComputerNameW
IsBadStringPtrA
user32
InsertMenuItemW
ChildWindowFromPoint
GetMessageA
GetWindowRgn
DrawTextW
GetDC
IsDlgButtonChecked
GetClassInfoA
LoadCursorA
CreateDialogParamW
CheckRadioButton
SetCursorPos
LoadImageA
SetWindowLongA
LoadMenuIndirectA
SetCapture
CreateMenu
EnableMenuItem
CharNextW
CheckDlgButton
OpenWindowStationA
gdi32
GetColorSpace
DeleteColorSpace
GetKerningPairsA
CreateMetaFileA
ColorCorrectPalette
GetCharWidthI
GetTextExtentExPointW
GetDCOrgEx
EnumFontFamiliesExW
GetClipRgn
GetCharWidth32W
CombineRgn
GetEnhMetaFileDescriptionA
SelectObject
UpdateICMRegKeyA
GetClipBox
CreateDIBPatternBrushPt
GetTextMetricsW
advapi32
IsValidAcl
RegDeleteValueW
RegRestoreKeyA
RegOpenKeyW
ole32
CoGetPSClsid
CoDeactivateObject
OleCreateEx
CLSIDFromProgID
CoGetCallerTID
OleUninitialize
CreateFileMoniker
Sections
.<9;kn% Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.E Size: 1KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.0<+' Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.< Size: 1024B - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.FpFJb Size: 3KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.(c1$7 Size: 1024B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 212KB - Virtual size: 211KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ