Static task
static1
Behavioral task
behavioral1
Sample
fba4cb991845a7017d42498de80fd07bc56998498aa817fdb3e9e3b275b8b78a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fba4cb991845a7017d42498de80fd07bc56998498aa817fdb3e9e3b275b8b78a.exe
Resource
win10v2004-20220812-en
General
-
Target
fba4cb991845a7017d42498de80fd07bc56998498aa817fdb3e9e3b275b8b78a
-
Size
617KB
-
MD5
26562213aae981c7964945da1b38b5e8
-
SHA1
b5a68568177eda03f7572e45f0861ed3255df397
-
SHA256
fba4cb991845a7017d42498de80fd07bc56998498aa817fdb3e9e3b275b8b78a
-
SHA512
535a4a50328b02201a841720ef3bbfaa9d6c85b71b646462dbe66ee923cecfbb7370f7e7266da20484a3f20c5dc635961296bf8edc1ec545406ec2dabd4d6ed2
-
SSDEEP
12288:mQcWBIVbEaNvkkJEYE9O2ZrJ6GkaRqJpkKF0ec+aZkA1M495dwUH:mQcWBuEGvkkGYE9XM0T+rO9HH
Malware Config
Signatures
Files
-
fba4cb991845a7017d42498de80fd07bc56998498aa817fdb3e9e3b275b8b78a.exe windows x86
b3575c099d63cee5567c6271406ce677
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathAddBackslashW
PathFileExistsW
stdisks
?ReadSector@CSTDisk@@QAEH_JPAE@Z
?SetOEMID@CSTVolume@@QAEHPBG@Z
?GetVolumeMountPoint@CSTVolume@@QAEXPAGK@Z
??4CSTPartition@@QAEABV0@ABV0@@Z
?GetPartitionAt@CSTDisk@@QAE?AVCSTPartition@@H@Z
?GetVolume@CSTPartition@@QAEAAVCSTVolume@@XZ
?GetPartitionCount@CSTDisk@@QAEHXZ
?Close@CSTDisk@@QAEXXZ
?Enumerate@CSTDisk@@QAEHXZ
?Open@CSTDisk@@QAEHK@Z
??1CSTDisk@@UAE@XZ
??1CSTPartition@@UAE@XZ
?WriteSector@CSTDisk@@QAEH_JPAX@Z
?OpenSystemDisk@CSTDisk@@QAEHXZ
?IsWindows@CSTVolume@@QAEHXZ
??0CSTDisk@@QAE@XZ
??0CSTPartition@@QAE@XZ
stsystems
?GetDiskNumber@CSTSystem@@SAKG@Z
kernel32
FindClose
FindFirstFileW
FindNextFileW
DeleteFileW
GetTickCount
GetWindowsDirectoryW
GetDiskFreeSpaceExW
IsBadWritePtr
WideCharToMultiByte
LocalAlloc
LocalFree
GetCurrentProcess
lstrlenW
RaiseException
InitializeCriticalSection
DeleteCriticalSection
GetModuleFileNameW
lstrcmpiW
WaitForSingleObject
CreateThread
Sleep
GetModuleHandleW
GetCurrentThreadId
CreateEventW
InterlockedIncrement
InterlockedDecrement
SetEvent
FreeLibrary
LoadLibraryExW
SetLastError
OpenProcess
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
GetCommandLineW
HeapFree
GetProcessHeap
HeapAlloc
ResetEvent
SystemTimeToFileTime
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetFileInformationByHandle
GetSystemDirectoryW
GetProcAddress
LoadLibraryW
IsBadStringPtrW
GetLocalTime
DeviceIoControl
CreateIoCompletionPort
GetQueuedCompletionStatus
EnterCriticalSection
LeaveCriticalSection
GetCurrentProcessId
UnlockFile
LockFile
GetSystemTimeAsFileTime
FormatMessageA
GetVersionExW
GetFileAttributesA
FlushFileBuffers
GetTempPathW
LockFileEx
LoadLibraryA
GetFullPathNameW
GetFullPathNameA
CreateFileA
GetFileSize
GetTempPathA
SetFilePointer
SetEndOfFile
AreFileApisANSI
DeleteFileA
QueryPerformanceCounter
GetCurrentThread
IsBadReadPtr
GetThreadLocale
GetOEMCP
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetCPInfo
FileTimeToLocalFileTime
GetStartupInfoW
GetFileAttributesW
WriteFile
SetFileAttributesW
WritePrivateProfileStringW
GetDriveTypeW
CreateFileW
ReadFile
MultiByteToWideChar
CloseHandle
GetLastError
OutputDebugStringW
GetVolumeInformationW
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
InterlockedCompareExchange
RtlUnwind
GetConsoleOutputCP
WriteConsoleW
CompareStringA
CompareStringW
SetEnvironmentVariableA
IsValidCodePage
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
VirtualFree
VirtualAlloc
HeapCreate
ExitProcess
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
SetHandleCount
GetFileType
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetSystemTime
GetStartupInfoA
WriteConsoleA
SetStdHandle
GetLocaleInfoW
GetConsoleMode
GetConsoleCP
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetTimeZoneInformation
GetLocaleInfoA
GetACP
InterlockedExchange
GetVersionExA
HeapSize
HeapReAlloc
HeapDestroy
IsDebuggerPresent
user32
LoadStringW
TranslateMessage
DispatchMessageW
GetMessageW
CharUpperW
MessageBoxW
PostThreadMessageW
KillTimer
SetTimer
CharNextW
UnregisterClassA
advapi32
OpenThreadToken
StartServiceCtrlDispatcherW
RegisterServiceCtrlHandlerW
StartServiceW
RegEnumKeyExW
RegQueryInfoKeyW
RegisterEventSourceW
ReportEventW
DeregisterEventSource
ControlService
DeleteService
CreateServiceW
RegCreateKeyExW
RegDeleteValueW
RegDeleteKeyW
SetServiceStatus
RegOpenKeyExW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
SetFileSecurityW
FreeSid
InitializeAcl
AddAccessAllowedAce
GetAce
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
RegCreateKeyW
RegSetValueExW
RegOpenKeyW
RegQueryValueExW
RegCloseKey
AllocateAndInitializeSid
SetNamedSecurityInfoW
OpenSCManagerW
OpenServiceW
CloseServiceHandle
QueryServiceStatusEx
ImpersonateSelf
ole32
CoRegisterClassObject
CoRevokeClassObject
CoUninitialize
CoTaskMemRealloc
CoTaskMemAlloc
CoInitialize
CoTaskMemFree
StringFromGUID2
CoCreateInstance
CoSetProxyBlanket
CoInitializeSecurity
oleaut32
SafeArrayGetElement
SafeArrayDestroyData
SafeArrayDestroyDescriptor
SafeArrayCreate
SafeArrayGetVartype
SafeArrayCopyData
SafeArrayRedim
SafeArrayPutElement
VariantInit
VariantClear
VarUI4FromStr
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
SysAllocString
SysFreeString
SysStringLen
LoadRegTypeLi
Sections
.text Size: 512KB - Virtual size: 511KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 80KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ