Static task
static1
Behavioral task
behavioral1
Sample
fc9f4c4e1f7effed71d69473f1cae101aeed8f638ad9221277f091a74c84f861.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fc9f4c4e1f7effed71d69473f1cae101aeed8f638ad9221277f091a74c84f861.exe
Resource
win10v2004-20220901-en
General
-
Target
fc9f4c4e1f7effed71d69473f1cae101aeed8f638ad9221277f091a74c84f861
-
Size
72KB
-
MD5
625f4921396fd4502f6a6196f5a54e20
-
SHA1
931507cd698eeb74e6d39dfc4482d0b6c9bd1eb8
-
SHA256
fc9f4c4e1f7effed71d69473f1cae101aeed8f638ad9221277f091a74c84f861
-
SHA512
7b71b737c565198fa0189cd8f9dac7977f70adb60da73a3017a730a2aff718588c75c92a3236f0cca5a89c4644661cf56ad837b511248cc0d7024bf23eb4bbf9
-
SSDEEP
1536:oqMg10vey1tb9lJlRG6M17RDg97GdGS7Me39n0pJ4Y39ORXdvyqH9Ov:5A1t46Mvg0GSYujQyww9Ov
Malware Config
Signatures
Files
-
fc9f4c4e1f7effed71d69473f1cae101aeed8f638ad9221277f091a74c84f861.exe windows x86
675bdbfbeb58ebb3ebc9d06cef117623
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
FindNextFileW
lstrcpynA
lstrcpyA
WaitForSingleObject
CreateProcessW
CreateDirectoryW
ReadFile
GetTempFileNameW
MulDiv
ExpandEnvironmentStringsW
SetFileAttributesW
OpenProcess
GlobalFree
MoveFileW
WideCharToMultiByte
GetPrivateProfileStringW
SetFilePointer
CreateThread
GetFileAttributesW
DeleteFileW
CreateFileW
lstrcpynW
GetCommandLineW
SearchPathW
RemoveDirectoryW
CloseHandle
GetModuleHandleW
SetErrorMode
CopyFileW
CompareFileTime
GetSystemDirectoryW
GetExitCodeProcess
FindFirstFileW
GetVersionExW
GetModuleHandleA
LoadLibraryExW
SetCurrentDirectoryW
lstrcmpiA
WritePrivateProfileStringW
GlobalLock
lstrcatW
GetFileSize
GetDiskFreeSpaceW
GetWindowsDirectoryW
lstrlenW
FindClose
GlobalAlloc
GetLastError
SetFileTime
GetModuleFileNameW
lstrcmpiW
lstrcmpW
MultiByteToWideChar
FreeLibrary
GlobalUnlock
WriteFile
GetVersion
GetFullPathNameW
GetVersionExA
VirtualProtect
LoadLibraryExA
LoadLibraryA
VirtualProtectEx
GetProcAddress
Sleep
LoadLibraryW
GlobalFindAtomA
GetProcessHeap
GetCurrentProcess
lstrlenA
lstrcmpA
GetShortPathNameW
ExitProcess
user32
GetDlgItemTextW
CreatePopupMenu
DrawTextW
LoadCursorW
FindWindowExW
PeekMessageW
IsWindowEnabled
SetCursor
CreateDialogParamW
PostQuitMessage
DestroyWindow
RegisterClassW
ExitWindowsEx
SetClassLongW
DialogBoxParamW
IsWindowVisible
DispatchMessageW
LoadBitmapW
SendMessageTimeoutW
SendMessageW
GetSystemMetrics
CheckDlgButton
wvsprintfW
EnableMenuItem
GetClientRect
EmptyClipboard
wsprintfW
GetClassInfoW
AppendMenuW
CharPrevW
DefWindowProcW
GetWindowRect
ShowWindow
CreateWindowExW
CharNextW
SetClipboardData
CloseClipboard
GetMessagePos
IsDlgButtonChecked
CharUpperW
SetTimer
GetSystemMenu
SetDlgItemTextW
OpenClipboard
GetDlgItem
GetDC
MessageBoxIndirectW
SetForegroundWindow
GetWindowLongW
SystemParametersInfoW
EndDialog
EnableWindow
EndPaint
IsWindow
BeginPaint
SetWindowTextW
GetSysColor
FillRect
TrackPopupMenu
CallWindowProcW
LoadImageW
InvalidateRect
GetAsyncKeyState
SetWindowLongW
CharNextA
ScreenToClient
wsprintfA
SetWindowPos
gdi32
CreateFontIndirectW
SetTextColor
SetBkMode
SetBkColor
GetDeviceCaps
CreateBrushIndirect
SelectObject
DeleteObject
winspool.drv
OpenPrinterA
advapi32
RegEnumValueW
RegCreateKeyExW
RegDeleteKeyW
RegQueryValueExW
RegOpenKeyExW
RegEnumKeyW
RegDeleteValueW
RegCloseKey
shell32
SHBrowseForFolderW
SHGetFileInfoW
SHFileOperationW
ShellExecuteW
SHGetSpecialFolderLocation
SHGetPathFromIDListW
comctl32
ImageList_Create
ImageList_AddMasked
ord17
ImageList_Destroy
setupapi
SetupAddInstallSectionToDiskSpaceListA
Sections
CODE Size: 55KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ