Static task
static1
Behavioral task
behavioral1
Sample
fbebb86bb85113fa75d10309be7dc158e2b3ae09a800ae909e701b9c2028f58c.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
fbebb86bb85113fa75d10309be7dc158e2b3ae09a800ae909e701b9c2028f58c.exe
Resource
win10v2004-en-20220113
General
-
Target
fbebb86bb85113fa75d10309be7dc158e2b3ae09a800ae909e701b9c2028f58c
-
Size
994KB
-
MD5
7748cd256ffcbf262761607ddb75bb38
-
SHA1
eef70ff4314467d0abfa757916600062bac584fb
-
SHA256
fbebb86bb85113fa75d10309be7dc158e2b3ae09a800ae909e701b9c2028f58c
-
SHA512
1fb7b60d8c002ff83d2ab44c6e02e624676595e3d142c3c4dab5a6d84b83401a4ca590ac68bdae85e78a2cd02cdba4769e50d6faaa68c2f318837ad14aba35ff
-
SSDEEP
24576:MV8MmL0e18nLNM6Z8gQbHDGq3ixHsWyU1hv/y:MVRvLO6KXGFZRyU1h3y
Malware Config
Signatures
Files
-
fbebb86bb85113fa75d10309be7dc158e2b3ae09a800ae909e701b9c2028f58c.exe windows x86
1e0163f18068f24424ba312e38f61f2e
Code Sign
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TerminateProcess
GetDriveTypeA
FindClose
OpenProcess
CreateToolhelp32Snapshot
Process32Next
CloseHandle
FreeConsole
lstrcmpW
GetLastError
SetLastError
QueryPerformanceCounter
QueryPerformanceFrequency
GetCurrentThread
GetThreadTimes
SetEndOfFile
WriteConsoleW
FindNextFileW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
HeapSize
HeapReAlloc
SetFilePointerEx
ReadConsoleW
ReadFile
SetStdHandle
CreateProcessA
GetExitCodeProcess
Process32First
FindFirstFileW
GetProcessHeap
GetLogicalDrives
MultiByteToWideChar
CreateDirectoryW
CreateFileW
DeleteFileW
FindFirstFileExW
GetDiskFreeSpaceExW
GetFileAttributesExW
GetFileInformationByHandle
AreFileApisANSI
GetModuleHandleW
GetProcAddress
MoveFileExW
WideCharToMultiByte
FormatMessageW
GetStringTypeW
EnterCriticalSection
LeaveCriticalSection
TryEnterCriticalSection
DeleteCriticalSection
GetCurrentThreadId
DuplicateHandle
WaitForSingleObjectEx
Sleep
GetCurrentProcess
SwitchToThread
GetExitCodeThread
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetTickCount
EncodePointer
DecodePointer
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
SetEvent
ResetEvent
InitializeSListHead
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStartupInfoW
GetCurrentProcessId
CreateTimerQueue
SignalObjectAndWait
CreateThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
FreeLibrary
FreeLibraryAndExitThread
GetModuleFileNameW
GetModuleHandleA
LoadLibraryExW
GetVersionExW
VirtualAlloc
VirtualProtect
VirtualFree
ReleaseSemaphore
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
LoadLibraryW
WaitForSingleObject
RtlUnwind
RaiseException
ExitProcess
GetModuleHandleExW
ExitThread
GetModuleFileNameA
GetStdHandle
WriteFile
GetCommandLineA
GetCommandLineW
GetACP
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileType
HeapAlloc
HeapFree
FlushFileBuffers
GetConsoleCP
GetConsoleMode
ws2_32
select
recv
getpeername
WSAGetLastError
WSACleanup
WSAStartup
htons
ioctlsocket
send
freeaddrinfo
getaddrinfo
ntohl
inet_ntoa
inet_addr
htonl
connect
socket
setsockopt
closesocket
advapi32
CryptReleaseContext
CryptAcquireContextA
CryptGenRandom
Sections
.text Size: 730KB - Virtual size: 730KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 187KB - Virtual size: 186KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 27KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ