Static task
static1
Behavioral task
behavioral1
Sample
fb57393a3ae6701c4cbbdb3a863a5b25e496e0c9aad101467aa6860b4f20a0a7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fb57393a3ae6701c4cbbdb3a863a5b25e496e0c9aad101467aa6860b4f20a0a7.exe
Resource
win10v2004-20220901-en
General
-
Target
fb57393a3ae6701c4cbbdb3a863a5b25e496e0c9aad101467aa6860b4f20a0a7
-
Size
264KB
-
MD5
6c22bbf7a12d0d2cd1fb14150b2344f3
-
SHA1
82ad1b2677ad1ea5530575514c75ea5a456b832c
-
SHA256
fb57393a3ae6701c4cbbdb3a863a5b25e496e0c9aad101467aa6860b4f20a0a7
-
SHA512
a5e70a41e55e2bcc3effb940c1982676c90f136a6a856f24c6e85fac89f574a97803a0491e79cc4efcbb33ec95cd35ec6d26fa82f7d2a44746003af01f0184fb
-
SSDEEP
6144:/R9fOIUDIJrfB3+pM5aIOqLVJ5bbZXegqw48gyH0YtnbvK/kFZjW:mIJrp3/alWJtbZU8JFtrymBW
Malware Config
Signatures
Files
-
fb57393a3ae6701c4cbbdb3a863a5b25e496e0c9aad101467aa6860b4f20a0a7.exe windows x86
2c0635e29f48f163a54b483aad7daf20
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcr80
_controlfp_s
_invoke_watson
_except_handler4_common
_decode_pointer
_onexit
_lock
__dllonexit
_unlock
__set_app_type
_encode_pointer
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
memmove
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
memset
sprintf_s
realloc
free
advapi32
RegQueryInfoKeyA
AllocateAndInitializeSid
OpenProcessToken
GetTokenInformation
EqualSid
FreeSid
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegEnumKeyA
kernel32
CreateFileA
FormatMessageA
MoveFileA
WriteFile
GetStartupInfoA
InterlockedCompareExchange
Sleep
CreateProcessA
GetExitCodeProcess
GetWindowsDirectoryA
GetSystemDirectoryA
IsDBCSLeadByte
lstrcpynA
LoadLibraryExA
CloseHandle
OpenProcess
ReleaseMutex
GetLastError
CreateMutexA
WritePrivateProfileStringA
MultiByteToWideChar
GetPrivateProfileStringA
FreeLibrary
WideCharToMultiByte
lstrcmpiA
lstrcpyA
lstrlenA
GetProcAddress
LoadLibraryA
lstrcmpA
RemoveDirectoryA
LocalFree
GetPrivateProfileIntA
LocalAlloc
DeleteFileA
GetFileAttributesA
FindClose
FindNextFileA
FindFirstFileA
GetCurrentProcessId
CopyFileA
SetFileAttributesA
GetTempFileNameA
GetTempPathA
GetModuleFileNameA
InterlockedExchange
ExitProcess
GetCommandLineA
GetModuleHandleA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetVersionExA
user32
CharUpperA
CharPrevA
MsgWaitForMultipleObjects
TranslateMessage
EnumChildWindows
MessageBoxA
LoadStringA
FindWindowA
CreateDialogParamA
DestroyWindow
GetWindowThreadProcessId
PostMessageA
CharNextA
PeekMessageA
DispatchMessageA
ole32
CoInitialize
CoCreateInstance
CLSIDFromString
CoUninitialize
oleaut32
SysFreeString
Sections
.text Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
�� Size: 239KB - Virtual size: 240KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE