Static task
static1
Behavioral task
behavioral1
Sample
ff3422a21658c48310250a45a1e4780c920a1e201926dc85506bbf4de29a7814.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ff3422a21658c48310250a45a1e4780c920a1e201926dc85506bbf4de29a7814.exe
Resource
win10v2004-20220901-en
General
-
Target
ff3422a21658c48310250a45a1e4780c920a1e201926dc85506bbf4de29a7814
-
Size
800KB
-
MD5
4f4bb33694f76e78b5cf7b1e7625ffc2
-
SHA1
ed8164720e9539109bcf877fd8f2dabce6292b5d
-
SHA256
ff3422a21658c48310250a45a1e4780c920a1e201926dc85506bbf4de29a7814
-
SHA512
8dd966653fc9efda5a9c0deee0363f9ee98c04a940cdae6b90bbdeb1a00cde165c584ffc4d1e007d6a29b41aade4c654019912477da3e6384f1a060e56fd76f1
-
SSDEEP
24576:xBJNDvLVYnWLcG70CwqDvQrB+0IBc/eeL7n4fbbAsag:TvKnWLp7RwIvQd2c/egs/
Malware Config
Signatures
Files
-
ff3422a21658c48310250a45a1e4780c920a1e201926dc85506bbf4de29a7814.exe windows x86
952755745f29b5221ee89bb85286ac71
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
DeleteDC
SetTextColor
SetBkColor
CreateSolidBrush
kernel32
ExitProcess
VirtualAlloc
GetOEMCP
FindResourceA
Sleep
VirtualFree
HeapCreate
CreateProcessA
SizeofResource
InterlockedExchange
GetModuleHandleW
GetACP
CloseHandle
ReadFile
SetFilePointer
TlsFree
MapViewOfFile
CompareStringA
RaiseException
InterlockedCompareExchange
HeapSize
WideCharToMultiByte
GetCommandLineW
LockResource
GetEnvironmentStrings
GlobalAlloc
GetEnvironmentStringsW
LCMapStringA
GetConsoleCP
GlobalFree
lstrlenA
LCMapStringW
InterlockedIncrement
CreateFileA
TlsSetValue
GetFileType
CreateFileW
GetTimeZoneInformation
FindNextFileA
CreateFileMappingA
ResetEvent
lstrcpyA
FindFirstFileA
CompareStringW
GetProcessHeap
GetSystemInfo
GetProcAddress
DeleteFileW
SetErrorMode
DeleteFileA
GetFileSize
GetStartupInfoA
LoadLibraryA
GetVersionExA
TlsAlloc
QueryPerformanceCounter
FreeLibrary
lstrcmpiA
EnterCriticalSection
HeapFree
LeaveCriticalSection
GetLocaleInfoA
SetEndOfFile
CreateEventW
VirtualQuery
TerminateProcess
MulDiv
GetCurrentProcessId
CreateThread
GetLocalTime
MultiByteToWideChar
TlsGetValue
UnhandledExceptionFilter
LoadLibraryExA
lstrcmpiW
GetModuleFileNameA
FlushFileBuffers
HeapAlloc
IsDebuggerPresent
GetModuleFileNameW
SetLastError
InterlockedDecrement
FindClose
LoadResource
InitializeCriticalSection
GetExitCodeProcess
FormatMessageW
LocalFree
SetEvent
GetStringTypeW
HeapReAlloc
GetSystemTimeAsFileTime
WriteFile
GetCPInfo
GetTempPathA
GetConsoleMode
GetCurrentProcess
DeleteCriticalSection
FreeEnvironmentStringsA
HeapDestroy
WaitForSingleObject
GetFileAttributesA
FileTimeToSystemTime
GetStdHandle
GetCurrentThreadId
GetLastError
GetVersion
GetModuleHandleA
GetCurrentThread
GetTickCount
GetCommandLineA
SetUnhandledExceptionFilter
user32
ScreenToClient
GetDlgItem
SetWindowTextA
SetWindowLongA
PostMessageA
GetWindowRect
GetSystemMetrics
DefWindowProcA
BeginPaint
SetFocus
DispatchMessageA
SetTimer
GetSubMenu
RegisterClassA
EnableMenuItem
IsWindowEnabled
TranslateMessage
EnableWindow
ShowWindow
SendMessageA
ReleaseDC
PeekMessageA
EndPaint
SetWindowPos
PostQuitMessage
EndDialog
MessageBoxA
GetSysColor
SystemParametersInfoA
InvalidateRect
CallWindowProcA
SetCursor
GetDesktopWindow
advapi32
RegDeleteValueA
RegSetValueExW
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegOpenKeyExW
RegSetValueExA
Sections
.text Size: 766KB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ