Static task
static1
Behavioral task
behavioral1
Sample
fe3a4ffe234d3fa625f6895483dcc36b71600b7621739c248da685671aaa6211.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fe3a4ffe234d3fa625f6895483dcc36b71600b7621739c248da685671aaa6211.exe
Resource
win10v2004-20220812-en
General
-
Target
fe3a4ffe234d3fa625f6895483dcc36b71600b7621739c248da685671aaa6211
-
Size
218KB
-
MD5
60246f41a2f8b74387e8ef2273205d34
-
SHA1
f441ea5adbc9bcfb3e4e91d08dd8721dd85f12db
-
SHA256
fe3a4ffe234d3fa625f6895483dcc36b71600b7621739c248da685671aaa6211
-
SHA512
320ae71872479c9281832ef36f0625e94c3d8fd86f5b32199bb7f65e518a2c971a1274b541afc8ff07b9fbc0f15191f77c9c6e4cb3de8472c58b85836d139570
-
SSDEEP
3072:XDTDTD8ft6upCJ4oATyIj/Z4/Hb17mnGDIHMhzf+p3fliT6wo33RVsTvG:XXXIUuFoAT/r2j17mnOzDI3gWwifW
Malware Config
Signatures
Files
-
fe3a4ffe234d3fa625f6895483dcc36b71600b7621739c248da685671aaa6211.exe windows x86
1937acd88aeb7b60b4465f15ae10aac6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CreateConsoleScreenBuffer
CreateDirectoryExW
CreateMailslotA
CreateMailslotW
CreateMutexA
CreateNamedPipeW
CreateProcessW
CreateTapePartition
CreateToolhelp32Snapshot
DeleteVolumeMountPointW
EnumCalendarInfoExW
EnumDateFormatsA
EnumSystemCodePagesW
EnumSystemLocalesW
FindNextVolumeMountPointA
FindNextVolumeW
FreeLibrary
GetAtomNameW
GetCPInfo
GetCPInfoExW
GetCommMask
GetCommProperties
GetCommandLineW
GetComputerNameA
GetConsoleAliasA
GetConsoleAliasExesA
GetConsoleAliasExesLengthW
GetCurrentDirectoryA
GetCurrentDirectoryW
GetCurrentProcessId
GetDiskFreeSpaceExW
GetDriveTypeA
GetFileAttributesExA
GetFileInformationByHandle
GetLastError
GetLocaleInfoW
GetModuleFileNameA
GetModuleHandleW
GetNamedPipeHandleStateA
GetNumberOfConsoleMouseButtons
GetOEMCP
GetPrivateProfileStringW
GetProcAddress
GetProcessIoCounters
GetProfileStringA
GetStartupInfoA
GetStringTypeW
GetSystemDefaultLangID
GetSystemDirectoryA
GetSystemDirectoryW
GetTempFileNameW
GetTimeFormatA
GetVersionExA
GetWindowsDirectoryW
ChangeTimerQueueTimer
GlobalFree
GlobalGetAtomNameW
Heap32First
Heap32ListFirst
HeapFree
InterlockedDecrement
IsBadCodePtr
IsValidLocale
LoadLibraryExA
LoadLibraryExW
LocalFree
LocalShrink
LocalSize
LocalUnlock
LockResource
Module32First
MoveFileW
MultiByteToWideChar
OpenEventW
OpenFile
OpenFileMappingA
OpenFileMappingW
OutputDebugStringW
PeekNamedPipe
PostQueuedCompletionStatus
Process32NextW
ReadConsoleInputW
ReleaseMutex
ReplaceFileA
RequestDeviceWakeup
RtlFillMemory
SearchPathW
SetCommConfig
SetCommTimeouts
SetConsoleActiveScreenBuffer
SetConsoleTextAttribute
SetEvent
SetFileApisToANSI
SetHandleInformation
SetProcessAffinityMask
SetStdHandle
SetThreadExecutionState
SetThreadIdealProcessor
SetThreadPriorityBoost
SetTimerQueueTimer
SetUnhandledExceptionFilter
Sleep
SystemTimeToFileTime
VirtualAllocEx
WriteConsoleW
WriteFileEx
lstrcatA
lstrcatW
lstrcpyn
lstrlenW
BeginUpdateResourceW
BackupSeek
AddConsoleAliasA
GetModuleHandleA
VirtualAlloc
GetWriteWatch
CreateFileW
user32
ChangeClipboardChain
CharLowerBuffA
CharNextW
CharUpperA
CharUpperBuffW
ClipCursor
CloseWindowStation
CreateCaret
CreateCursor
CreateMDIWindowA
CreateMenu
CreateWindowStationW
DdeClientTransaction
DdeGetLastError
DdeQueryNextServer
DefDlgProcA
DefWindowProcA
DeregisterShellHookWindow
DestroyIcon
DestroyMenu
DestroyWindow
DlgDirListComboBoxW
DlgDirSelectExW
DrawAnimatedRects
DrawEdge
DrawFocusRect
DrawIconEx
DrawStateA
DrawTextW
EndDeferWindowPos
EnumDesktopsW
EnumDisplaySettingsW
EnumWindowStationsW
EqualRect
GetClassInfoExA
GetClassInfoW
GetClipCursor
GetDCEx
GetKeyboardLayoutNameA
GetLastActivePopup
GetMenuBarInfo
GetMenuCheckMarkDimensions
GetMessageTime
GetMonitorInfoW
GetMouseMovePointsEx
GetNextDlgGroupItem
GetPropA
GetShellWindow
GetTabbedTextExtentW
GetWindowInfo
GetWindowTextW
GrayStringA
IMPQueryIMEA
InsertMenuA
InternalGetWindowText
IsRectEmpty
LoadAcceleratorsA
LoadKeyboardLayoutW
LoadMenuIndirectW
LoadStringA
LoadStringW
MapVirtualKeyExA
MessageBoxW
ModifyMenuA
OpenWindowStationA
PostThreadMessageW
RedrawWindow
RegisterShellHookWindow
ReleaseCapture
ReleaseDC
SendDlgItemMessageA
SendInput
SendMessageTimeoutW
SendMessageW
SetCaretBlinkTime
SetClassWord
SetClipboardViewer
SetCursor
SetLastErrorEx
SetSysColors
SetUserObjectInformationW
SetWindowRgn
SetWindowTextW
SetWindowsHookW
TabbedTextOutA
TrackPopupMenu
UnhookWindowsHook
WindowFromDC
WindowFromPoint
CallNextHookEx
BlockInput
AnimateWindow
AdjustWindowRectEx
ActivateKeyboardLayout
LoadIconW
CascadeChildWindows
advapi32
CloseServiceHandle
ControlService
OpenSCManagerW
OpenServiceW
QueryServiceStatus
RegOpenKeyExA
msvcrt
_XcptFilter
__CxxFrameHandler
__dllonexit
__getmainargs
__p__commode
__p__fmode
__set_app_type
__setusermatherr
_acmdln
_adjust_fdiv
_c_exit
_cexit
_controlfp
_except_handler3
_exit
_initterm
_onexit
_stricmp
_strnicmp
exit
sprintf
swprintf
wcscmp
wcscpy
wcslen
wcsncpy
Sections
.text Size: 195KB - Virtual size: 194KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 360B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ