Static task
static1
Behavioral task
behavioral1
Sample
fc13569e96a5c6a378c284510d3321e803bc231b283d86c7ba105d42ec7ef3c3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fc13569e96a5c6a378c284510d3321e803bc231b283d86c7ba105d42ec7ef3c3.exe
Resource
win10v2004-20220812-en
General
-
Target
fc13569e96a5c6a378c284510d3321e803bc231b283d86c7ba105d42ec7ef3c3
-
Size
380KB
-
MD5
a2539586a2f3004839f4edc98b2d0a80
-
SHA1
f5dee5b6b3b97fcbf7d8af3c8b5df0099e65d776
-
SHA256
fc13569e96a5c6a378c284510d3321e803bc231b283d86c7ba105d42ec7ef3c3
-
SHA512
0b176aa588521f60e5a1847f6f0791a331948fee51fb648ac08bf3a54af1302246a6f246a1b4f0f6f779fd0f7baede986b7d4497ded2ceb83f6b67403af6beed
-
SSDEEP
6144:Pb41nDY6RZ+Pl9Mx0BeY6LCMXRdveOqvQ2w9Z5xntrGtccvsBfDv+LmOQicI:P8dZ6Mx0UYRMXDveDQ2+tckBbmLmOKI
Malware Config
Signatures
Files
-
fc13569e96a5c6a378c284510d3321e803bc231b283d86c7ba105d42ec7ef3c3.exe windows x86
5e01feb0c8712b4079282e56efc8078d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
LoadLibraryExA
GetModuleHandleA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetLastError
lstrlenA
CreateFileA
GetModuleFileNameA
ntdll
RtlLengthSid
RtlInitUnicodeString
RtlFreeHeap
RtlAllocateHeap
advapi32
RegOpenKeyExA
LsaClose
RegSetValueExA
RegQueryValueExA
RegCloseKey
LsaOpenPolicy
ulib
?GetLexeme@ARGUMENT@@QAEPAVWSTRING@@XZ
??0DSTRING@@QAE@XZ
??0PATH@@QAE@XZ
??0STRING_ARGUMENT@@QAE@XZ
??0ARRAY@@QAE@XZ
??0ARGUMENT_LEXEMIZER@@QAE@XZ
??1PROGRAM@@UAE@XZ
?ValidateVersion@PROGRAM@@UBEXKK@Z
?Usage@PROGRAM@@UBEXXZ
Sections
.text Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 131KB - Virtual size: 131KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_MEM_READ