Behavioral task
behavioral1
Sample
fd6684dd1032b8018b99e709011aca612402a80b09444e551990ef7d356c0c7d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fd6684dd1032b8018b99e709011aca612402a80b09444e551990ef7d356c0c7d.exe
Resource
win10v2004-20220812-en
General
-
Target
fd6684dd1032b8018b99e709011aca612402a80b09444e551990ef7d356c0c7d
-
Size
608KB
-
MD5
6c16bf78379114717c1b3450f16096d0
-
SHA1
7a29bac763eb31f38a9ee0f41ecf92b6ac5d176a
-
SHA256
fd6684dd1032b8018b99e709011aca612402a80b09444e551990ef7d356c0c7d
-
SHA512
7bbad408bfe53452256b95121d0d267ba858b35155869029b75d557934579b9f5009ccf96a613e7e5c2c937cef24b21fcb797d8ae110beda2e783ac8e8516ac0
-
SSDEEP
12288:JOg17Ax9B5/DgQv9WDfDrwRvUxK2PF+bDvJAmTs9C+hGaCk3:JOg17Ax9LkPDfDrucxK2GW4Dk3
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
fd6684dd1032b8018b99e709011aca612402a80b09444e551990ef7d356c0c7d.exe windows x86
44242f07a124cd04f928fdf3fd61fe3d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord1727
ord2444
ord2124
ord5277
ord2982
ord3147
ord3259
ord4465
ord3136
ord3262
ord2985
ord3081
ord2976
ord3830
ord3831
ord3825
ord3079
ord4080
ord4627
ord4424
ord807
ord2920
ord2012
ord2120
ord554
ord4163
ord1644
ord1146
ord5572
ord2915
ord939
ord940
ord941
ord5787
ord4133
ord4297
ord1621
ord537
ord2764
ord4202
ord5856
ord536
ord2452
ord1195
ord472
ord5883
ord5440
ord6383
ord5450
ord6394
ord5265
ord4376
ord4853
ord4998
ord4710
ord2514
ord6052
ord1775
ord5241
ord6374
ord5280
ord5065
ord5261
ord2446
ord4425
ord3597
ord641
ord324
ord4234
ord2379
ord2575
ord4396
ord5290
ord3402
ord3574
ord809
ord609
ord556
ord567
ord4275
ord4284
ord5053
ord4774
ord5981
ord6270
ord3874
ord283
ord6880
ord2122
ord4160
ord6358
ord1088
ord1771
ord6366
ord2413
ord2024
ord4219
ord2581
ord4401
ord3639
ord692
ord2860
ord3752
ord3698
ord2108
ord2818
ord2585
ord4365
ord5085
ord1709
ord1714
ord4404
ord5258
ord3722
ord529
ord796
ord2841
ord4265
ord1200
ord2117
ord6000
ord3706
ord755
ord5781
ord3483
ord3294
ord2754
ord470
ord3484
ord4299
ord6067
ord3482
ord4497
ord2107
ord4759
ord4755
ord765
ord1871
ord1949
ord5821
ord3662
ord812
ord801
ord818
ord1176
ord414
ord559
ord541
ord713
ord2809
ord2970
ord1270
ord1232
ord2393
ord1567
ord6144
ord268
ord3089
ord1706
ord430
ord786
ord2461
ord3318
ord6389
ord519
ord6311
ord6283
ord6282
ord4171
ord5445
ord703
ord404
ord3216
ord4042
ord2504
ord5903
ord5510
ord1652
ord429
ord3754
ord6128
ord2634
ord6130
ord6141
ord3984
ord3989
ord5859
ord5862
ord2233
ord4045
ord5610
ord5604
ord6605
ord482
ord4333
ord2820
ord3811
ord2652
ord1669
ord6143
ord4544
ord3274
ord4622
ord3579
ord439
ord736
ord5685
ord4226
ord3610
ord656
ord6199
ord2089
ord816
ord562
ord2411
ord2023
ord4218
ord2578
ord5873
ord3582
ord616
ord6241
ord2080
ord3797
ord3742
ord2152
ord6197
ord6379
ord6215
ord2294
ord2362
ord2302
ord6883
ord924
ord6334
ord3749
ord2587
ord4406
ord3394
ord3729
ord4589
ord4588
ord4899
ord4370
ord4892
ord4533
ord5076
ord4340
ord4889
ord4531
ord4545
ord4543
ord4526
ord4529
ord4524
ord4963
ord4960
ord4108
ord6054
ord5240
ord5281
ord3748
ord1725
ord2091
ord4432
ord804
ord501
ord364
ord784
ord773
ord5621
ord4241
ord4720
ord4347
ord1083
ord5037
ord2642
ord665
ord1979
ord6385
ord5186
ord354
ord5260
ord1842
ord2723
ord2390
ord3059
ord5100
ord5103
ord4467
ord4303
ord3350
ord5012
ord975
ord5472
ord3403
ord2879
ord2878
ord4151
ord4077
ord5237
ord5282
ord2649
ord1665
ord4436
ord4427
ord674
ord366
ord4242
ord5252
ord1233
ord2494
ord2627
ord2626
ord6625
ord4457
ord926
ord1858
ord4245
ord5101
ord2101
ord5104
ord3351
ord976
ord4152
ord2382
ord5283
ord2445
ord401
ord5254
ord5882
ord4458
ord2135
ord6094
ord1799
ord614
ord290
ord1105
ord3721
ord795
ord2370
ord2098
ord4538
ord2301
ord3092
ord2513
ord293
ord5607
ord922
ord5442
ord3499
ord2515
ord355
ord4614
ord4613
ord6640
ord3337
ord2535
ord2246
ord3517
ord542
ord802
ord5601
ord6569
ord5622
ord1859
ord4246
ord3869
ord2127
ord2391
ord5102
ord5105
ord4468
ord2880
ord4153
ord2383
ord5284
ord4437
ord4428
ord402
ord5255
ord6069
ord4413
ord2086
ord4267
ord4476
ord6785
ord2289
ord4615
ord4612
ord4610
ord4274
ord6375
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord4079
ord4698
ord5307
ord5289
ord5714
ord3738
ord815
ord561
ord617
ord5301
ord5214
ord296
ord986
ord411
ord4159
ord2621
ord1134
ord3521
ord3522
ord2725
ord1199
ord3495
ord3177
ord1825
ord4238
ord4696
ord3058
ord3065
ord6336
ord2510
ord2542
ord5243
ord5740
ord1746
ord5577
ord3172
ord5653
ord4953
ord4858
ord2399
ord4387
ord3454
ord3198
ord6080
ord6175
ord4623
ord4426
ord338
ord652
ord4823
ord4420
ord1948
ord5303
ord4699
ord5715
ord565
ord817
ord2726
ord6743
ord6515
ord6669
ord6172
ord6021
ord6189
ord4330
ord6186
ord5756
ord6192
ord5759
ord2971
ord3619
ord858
ord2614
ord5788
ord2567
ord5683
ord4277
ord2763
ord4129
ord5875
ord3693
ord3573
ord2859
ord5606
ord2863
ord4083
ord6142
ord2438
ord3654
ord2584
ord4220
ord1862
ord500
ord3701
ord6376
ord2055
msvcrt
_setmbcp
__CxxFrameHandler
free
malloc
wcscpy
wcslen
_ftol
memmove
_mbscmp
_mbsnbcpy
strtoul
_mbstok
atoi
_CIpow
__dllonexit
_onexit
_except_handler3
?terminate@@YAXXZ
??1type_info@@UAE@XZ
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
_itoa
kernel32
GetModuleHandleA
GetOverlappedResult
ResetEvent
WaitCommEvent
ClearCommError
ReadFile
GetCommState
SetCommState
GetLastError
SetupComm
CreateEventA
SetCommTimeouts
SetCommMask
SetEvent
PurgeComm
WaitForSingleObject
TerminateThread
GetWindowsDirectoryA
WinExec
Sleep
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetTickCount
MulDiv
GlobalSize
GlobalLock
GlobalUnlock
GlobalReAlloc
CreateFileA
WriteFile
CloseHandle
lstrcmpiA
FindResourceA
LoadResource
LockResource
GetCPInfo
lstrlenW
lstrlenA
GetVersion
GetVersionExA
LoadLibraryA
GetStartupInfoA
user32
GetCursorPos
IsClipboardFormatAvailable
GetMessagePos
InvertRect
ClipCursor
SetCapture
ReleaseCapture
GetCapture
DispatchMessageA
TranslateMessage
GetDoubleClickTime
GetFocus
IsWindowVisible
IsRectEmpty
UpdateWindow
SetActiveWindow
EnumChildWindows
TabbedTextOutA
LoadBitmapA
GetSysColorBrush
GetMenuStringA
IsWindow
CreatePopupMenu
GetMenuItemID
GetMenuState
ModifyMenuA
GetMenuItemCount
AppendMenuA
GetSystemMetrics
GetDesktopWindow
GetDC
DrawTextA
GetKeyState
DrawIconEx
DestroyIcon
SystemParametersInfoA
GetSysColor
CopyRect
FillRect
DrawEdge
SetRect
GetMenuItemInfoA
LoadImageA
GetClassInfoA
DefWindowProcA
LoadCursorA
ScreenToClient
PtInRect
SetTimer
KillTimer
IsZoomed
ShowScrollBar
DrawStateA
FrameRect
InflateRect
OffsetRect
DrawFocusRect
GetWindowRect
ClientToScreen
WindowFromPoint
GetActiveWindow
PostMessageA
InvalidateRect
SetCursor
GetParent
ReleaseDC
IntersectRect
GetNextDlgTabItem
IsMenu
SendMessageA
GetWindowLongA
DestroyCursor
GetClientRect
EnableWindow
GetSubMenu
GrayStringA
CreateMenu
gdi32
Ellipse
DeleteDC
DeleteObject
SelectObject
CreateDIBSection
SetPixel
GetPixel
PtVisible
RectVisible
PatBlt
TextOutA
ExtTextOutA
Escape
GetStockObject
GetTextExtentPoint32A
SetBkColor
CreateBitmap
CreateRectRgnIndirect
StretchBlt
GetCurrentObject
CreateFontA
GetBkColor
GetTextMetricsA
CreateDCA
GetTextExtentPoint32W
CreateCompatibleBitmap
CreateFontIndirectA
CreateSolidBrush
CreatePen
GetBkMode
GetDeviceCaps
BitBlt
CreateHalftonePalette
CreateCompatibleDC
GetDIBColorTable
SetTextColor
GetObjectA
CreatePalette
advapi32
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
shell32
ShellExecuteExA
comctl32
ImageList_ReplaceIcon
ImageList_GetImageCount
ImageList_Draw
_TrackMouseEvent
ImageList_GetIcon
ImageList_AddMasked
ImageList_GetImageInfo
ole32
OleInitialize
OleUninitialize
Sections
.text Size: 252KB - Virtual size: 251KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.UPX Size: 260KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE