Static task
static1
Behavioral task
behavioral1
Sample
fe5c94a869ff2339124ae922d136d6dee96f8129e2f74c291454eca4c7c8086d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fe5c94a869ff2339124ae922d136d6dee96f8129e2f74c291454eca4c7c8086d.exe
Resource
win10v2004-20220901-en
General
-
Target
fe5c94a869ff2339124ae922d136d6dee96f8129e2f74c291454eca4c7c8086d
-
Size
92KB
-
MD5
062c129ab2c642ebfa9616c66c62541e
-
SHA1
11206a2de59ea2e03f39ad831161a62285763a3b
-
SHA256
fe5c94a869ff2339124ae922d136d6dee96f8129e2f74c291454eca4c7c8086d
-
SHA512
ad758cc34004c6b4ccb6d2486e53ca47707b3bf0967ad4a9c9f17dd47898f736a45a3a85bb39a2618f87706b4a3324426663a1e449269a2f798b2cc76bc9beb7
-
SSDEEP
1536:OEVzg+aEofoMNxQbVw7qOCpipTFVAm4D88P4sA9NcgBsC1:nzg+BxM/uS7qOCM5fAjFAfcgBs0
Malware Config
Signatures
Files
-
fe5c94a869ff2339124ae922d136d6dee96f8129e2f74c291454eca4c7c8086d.exe windows x86
7b4bd9c8a555ad0f4e00e295b3589af9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DefWindowProcW
DeleteMenu
DestroyWindow
DialogBoxIndirectParamW
DialogBoxParamW
DispatchMessageW
EndDialog
EnumDisplayMonitors
EnumWindows
ExitWindowsEx
FindWindowW
GetAsyncKeyState
CallNextHookEx
GetDesktopWindow
GetDlgItem
GetDlgItemTextW
GetKeyState
GetMessageTime
GetMessageW
GetParent
GetSystemMenu
GetSystemMetrics
GetUserObjectInformationW
GetWindowLongW
GetWindowPlacement
GetWindowRect
GetWindowTextW
IsDlgButtonChecked
KillTimer
LoadCursorW
LoadImageW
LoadLocalFonts
LoadStringW
LockWindowStation
MBToWCSEx
MessageBoxW
MsgWaitForMultipleObjects
OpenDesktopW
OpenInputDesktop
PeekMessageW
PostMessageW
PostQuitMessage
PostThreadMessageW
RecordShutdownReason
RegisterClassW
RegisterDeviceNotificationW
RegisterHotKey
RegisterLogonProcess
RegisterWindowMessageW
ReplyMessage
CheckDlgButton
SendMessageW
SendNotifyMessageW
SetCursor
SetDlgItemTextW
SetFocus
SetForegroundWindow
SetLastErrorEx
SetLogonNotifyWindow
SetProcessWindowStation
SetThreadDesktop
SetTimer
SetUserObjectInformationW
SetUserObjectSecurity
SetWindowLongW
SetWindowPlacement
SetWindowPos
SetWindowStationUser
SetWindowTextW
SetWindowsHookW
ShowWindow
SwitchDesktop
SystemParametersInfoW
CloseDesktop
TranslateMessage
UnhookWindowsHook
UnlockWindowStation
CloseWindowStation
UnregisterHotKey
UpdatePerUserSystemParameters
UpdateWindow
wsprintfA
wsprintfW
wvsprintfW
CreateDesktopW
CreateDialogParamW
CreateWindowExW
CreateWindowStationW
kernel32
CreateThread
DeleteCriticalSection
DeleteFileA
EnterCriticalSection
ExpandEnvironmentStringsA
FindClose
FindFirstFileA
FindNextFileA
FreeLibrary
GetCurrentProcessId
GetDiskFreeSpaceA
GetExitCodeThread
GetFileAttributesA
GetFileSize
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetSystemDefaultLangID
GetSystemInfo
CloseHandle
GetTickCount
GetUserDefaultLangID
GlobalAlloc
GlobalFree
CompareStringW
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
LCMapStringW
LeaveCriticalSection
LoadLibraryA
CopyFileA
MapViewOfFile
MoveFileA
OpenEventA
OpenFileMappingA
OpenMutexA
OpenSemaphoreA
ReadFile
ReadFileEx
CreateDirectoryA
ReleaseMutex
ReleaseSemaphore
RemoveDirectoryA
ResetEvent
CreateEventA
CreateFileA
SetEndOfFile
SetEvent
SetFilePointer
SetThreadPriority
Sleep
SleepEx
UnmapViewOfFile
VirtualAlloc
VirtualFree
WaitForMultipleObjects
WaitForSingleObject
CreateMutexA
WaitForSingleObjectEx
WriteFile
WriteFileEx
lstrcmpA
lstrcpyA
lstrlenA
CreateSemaphoreA
gdi32
DeleteObject
advapi32
GetUserNameA
RegOpenKeyExA
RegQueryValueExA
ntdll
_alloca_probe
_snprintf
memcmp
memset
swprintf
wcscmp
wcscpy
wcslen
wcsncpy
shell32
SHGetDesktopFolder
Sections
.text Size: 4KB - Virtual size: 796B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 482B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ