Static task
static1
Behavioral task
behavioral1
Sample
fc1f46f8781ece6180149c8236fd4b545a17a24f7a9add98c632621e03c30ced.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fc1f46f8781ece6180149c8236fd4b545a17a24f7a9add98c632621e03c30ced.exe
Resource
win10v2004-20220812-en
General
-
Target
fc1f46f8781ece6180149c8236fd4b545a17a24f7a9add98c632621e03c30ced
-
Size
768KB
-
MD5
76d8ce9bb5af2da87f85bd9796019fb2
-
SHA1
a05f05af051bc8d3a977ed1136b928d5b9016eab
-
SHA256
fc1f46f8781ece6180149c8236fd4b545a17a24f7a9add98c632621e03c30ced
-
SHA512
769d3f6784cbadadba31d7afa886980c738d1735847ddba2804a3101bbf9c4fd441059abfddee5123579c3e0421e34bf5e52108d5e051704cfe2f7deeded2afa
-
SSDEEP
6144:MhlyJKEl6DuSt1llrHTripHtPeax4G5XNVt7P0CV5wt55cMk:MwSt1brip0uNPV5wNV
Malware Config
Signatures
Files
-
fc1f46f8781ece6180149c8236fd4b545a17a24f7a9add98c632621e03c30ced.exe windows x86
d4b5de9dd424adee38e9eb6a53a92964
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
winmm
timeGetTime
timeBeginPeriod
timeEndPeriod
kernel32
WriteFile
SetFilePointer
FlushFileBuffers
SetEndOfFile
GetCurrentProcess
CreateFileA
GetFileAttributesA
HeapAlloc
HeapFree
HeapReAlloc
VirtualAlloc
RtlUnwind
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
GetCommandLineA
ReadFile
GetStartupInfoA
ExitProcess
HeapSize
VirtualFree
HeapDestroy
HeapCreate
GetStdHandle
GetACP
IsValidCodePage
SetHandleCount
GetFileType
GetConsoleCP
GetConsoleMode
Sleep
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
GetLocaleInfoW
WritePrivateProfileStringA
FindResourceExA
GetOEMCP
GetCPInfo
GetThreadLocale
GlobalFlags
InterlockedIncrement
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
InterlockedDecrement
GetModuleFileNameW
VirtualProtect
FreeResource
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpW
FormatMessageA
LocalFree
MulDiv
SetLastError
GetModuleHandleA
GetCurrentProcessId
CreateMutexA
WaitForSingleObject
ReleaseMutex
CloseHandle
GetEnvironmentStrings
GlobalHandle
GlobalUnlock
GlobalFree
GlobalAlloc
GlobalLock
IsBadReadPtr
GetPrivateProfileStringA
GetSystemDirectoryA
GetModuleFileNameA
GetVersionExA
SetErrorMode
FindResourceA
LoadResource
LockResource
SizeofResource
GetWindowsDirectoryA
GetSystemInfo
GlobalMemoryStatus
GetLogicalDrives
GetLogicalDriveStringsA
GetDriveTypeA
lstrlenA
CompareStringA
GetProcAddress
FreeLibrary
LoadLibraryA
GetVersion
GetLastError
WideCharToMultiByte
MultiByteToWideChar
InterlockedExchange
GetProcessHeap
CreateFileW
user32
UnregisterClassA
EndDialog
GetActiveWindow
MapDialogRect
GetAsyncKeyState
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
RegisterWindowMessageA
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
SetActiveWindow
DispatchMessageA
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
SetForegroundWindow
IsWindowVisible
UpdateWindow
GetClientRect
PostMessageA
CreateWindowExA
GetClassInfoExA
RegisterClassA
AdjustWindowRectEx
DefWindowProcA
CallWindowProcA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetSystemMetrics
GetWindowThreadProcessId
GetLastActivePopup
MessageBoxA
GetWindowTextA
GetParent
SetFocus
IsWindowEnabled
ShowWindow
MoveWindow
SetWindowLongA
GetDlgCtrlID
IsWindow
SetWindowTextA
GetWindowLongA
IsDialogMessageA
SendDlgItemMessageA
GetWindow
EndPaint
BeginPaint
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
LoadCursorA
SetCursor
GetClassNameA
GetClassInfoA
LoadIconA
SetClassLongA
GetSystemMenu
AppendMenuA
SetRect
GetCursorPos
GetDlgItem
ScreenToClient
SendMessageA
EnableWindow
ReleaseDC
GetDC
DrawFocusRect
GetSysColorBrush
GetMessageA
TranslateMessage
ValidateRect
PostQuitMessage
DestroyMenu
CreateDialogIndirectParamA
GetMenu
GetNextDlgTabItem
FillRect
OffsetRect
PtInRect
CopyRect
GetSysColor
LoadStringA
GetDesktopWindow
GetWindowRect
SetWindowPos
SetDlgItemTextA
InflateRect
wsprintfA
GetFocus
gdi32
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
CreateBitmap
CreatePen
CreateSolidBrush
EnumFontFamiliesExA
MoveToEx
LineTo
CreateCompatibleDC
GetObjectA
SelectObject
BitBlt
DeleteDC
GetDeviceCaps
GetTextMetricsA
GetStockObject
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
DeleteObject
SetStretchBltMode
StretchDIBits
SelectPalette
RealizePalette
CreatePalette
comdlg32
GetSaveFileNameA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shlwapi
PathFindFileNameA
PathFindExtensionA
oleaut32
VariantInit
VariantChangeType
VariantClear
Sections
.text Size: 236KB - Virtual size: 233KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 408KB - Virtual size: 405KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 52KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
�BA Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE