Static task
static1
Behavioral task
behavioral1
Sample
fbad089f1244959e6c4178dc7df3914ce2ecfa4a4d8a9273141a220d44972646.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
fbad089f1244959e6c4178dc7df3914ce2ecfa4a4d8a9273141a220d44972646.exe
Resource
win10v2004-20220414-en
General
-
Target
fbad089f1244959e6c4178dc7df3914ce2ecfa4a4d8a9273141a220d44972646
-
Size
416KB
-
MD5
562a061909e2615ded02012723dce00c
-
SHA1
3e3432cf06fe8e35da97e4dd2f40b1d250354b40
-
SHA256
fbad089f1244959e6c4178dc7df3914ce2ecfa4a4d8a9273141a220d44972646
-
SHA512
95e610c69e853ea8f69290240c9842485360745468cd6f848df2b01b3461e145ec6c44a23161b96c361606da7d1042cacdcf3ec24e5e656c32be4ff83c72b077
-
SSDEEP
6144:0wY4wgwbbqWUE6dUulFeLstGsNzqFcuRp+OCWJNJ:84wgwvq06dUuscGsNzqO2p+m
Malware Config
Signatures
Files
-
fbad089f1244959e6c4178dc7df3914ce2ecfa4a4d8a9273141a220d44972646.exe windows x86
009fc915203bd0195726c72162ee335d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetConsoleTitleA
BeginUpdateResourceW
VirtualAllocEx
WriteConsoleOutputCharacterW
EnumResourceLanguagesW
UnlockFileEx
SetComputerNameExW
GetOEMCP
GetFileTime
SetThreadLocale
IsProcessorFeaturePresent
GetConsoleAliasExesA
ReadFileEx
SetVolumeMountPointA
VirtualAlloc
TerminateThread
EnumCalendarInfoA
CreateFileW
CreateEventW
GetDiskFreeSpaceExA
GetCPInfoExA
GetProcAddress
GetModuleHandleA
GetFullPathNameW
GetCurrencyFormatW
PeekConsoleInputW
GetCPInfo
GlobalMemoryStatus
InterlockedFlushSList
EnumSystemCodePagesW
GetFirmwareEnvironmentVariableA
FreeEnvironmentStringsW
lstrlenA
CompareStringW
CompareStringA
GetTimeZoneInformation
CloseHandle
CreateFileA
GetLocaleInfoW
ReadFile
QueryDosDeviceW
IsDBCSLeadByte
GlobalAlloc
GetConsoleFontSize
PeekConsoleInputA
WinExec
InterlockedDecrement
GetSystemDirectoryW
GetConsoleWindow
FindFirstFileA
FormatMessageW
FindNextFileW
SetCommBreak
GetMailslotInfo
ExitProcess
FlushFileBuffers
IsValidLocale
RaiseException
RtlUnwind
GetCommandLineA
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
GetLastError
HeapFree
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
GetCurrentThread
EnterCriticalSection
LeaveCriticalSection
Sleep
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
HeapCreate
HeapDestroy
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
GetConsoleCP
GetConsoleMode
GetACP
IsValidCodePage
MultiByteToWideChar
FatalAppExitA
HeapReAlloc
HeapSize
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
LoadLibraryA
InitializeCriticalSectionAndSpinCount
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
SetEnvironmentVariableA
user32
MessageBoxExA
CopyIcon
GetClipboardFormatNameW
GetMonitorInfoA
RegisterClipboardFormatA
GetMenuBarInfo
advapi32
DuplicateTokenEx
RegSaveKeyW
RegSetValueExW
LockServiceDatabase
CloseEventLog
RegSaveKeyA
RegNotifyChangeKeyValue
SetServiceStatus
SetFileSecurityW
QueryServiceConfigW
SetAclInformation
ObjectCloseAuditAlarmW
RegConnectRegistryW
RegOpenKeyW
msimg32
AlphaBlend
Sections
.text Size: 241KB - Virtual size: 241KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 112KB - Virtual size: 616KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 6KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ