Static task
static1
Behavioral task
behavioral1
Sample
fccf98555ca5f1c110163b2d07db2ecf86207b42551e3d31938ebd4e6ec5621c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fccf98555ca5f1c110163b2d07db2ecf86207b42551e3d31938ebd4e6ec5621c.exe
Resource
win10v2004-20220812-en
General
-
Target
fccf98555ca5f1c110163b2d07db2ecf86207b42551e3d31938ebd4e6ec5621c
-
Size
218KB
-
MD5
5a366d62530247bbb7fe6460fc748da0
-
SHA1
c430642e000fbff14d0e05209085a473d33aaf1f
-
SHA256
fccf98555ca5f1c110163b2d07db2ecf86207b42551e3d31938ebd4e6ec5621c
-
SHA512
dd08b8d160aecfc2f6937475e058b29b4ab70cf0f5d9ecde56d4dddd297fac8437f5943a7c10f4bbb5ee349911d038003526429aabd3fc04f344969d02645c67
-
SSDEEP
6144:2TMpSoR/PJ+Ol8uTCnDnxdj24lSZACZK:2WSoR/PJ+OlvqDxR24lSZAd
Malware Config
Signatures
Files
-
fccf98555ca5f1c110163b2d07db2ecf86207b42551e3d31938ebd4e6ec5621c.exe windows x86
3e705c23c340c34b74111aded23e2078
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalFree
GetModuleHandleA
GetLocalTime
GlobalMemoryStatusEx
GetSystemTime
GetDriveTypeA
GetFileAttributesA
SetFileAttributesA
LoadLibraryA
GetModuleFileNameA
IsDebuggerPresent
GetVersionExA
OpenFile
SetFileTime
GetFileTime
GetComputerNameA
CreateFileA
WriteFile
ReadFile
CreateMailslotA
GetCurrentProcessId
GlobalLock
GlobalUnlock
GetLogicalDrives
GetTickCount
GetDiskFreeSpaceExA
CompareStringW
GetTimeZoneInformation
GetProcessHeap
SetEndOfFile
GetDriveTypeW
WriteConsoleW
SetStdHandle
GetStringTypeW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
QueryPerformanceCounter
GetEnvironmentStringsW
GetProcAddress
CreatePipe
HeapSize
GetLocaleInfoW
LoadLibraryW
GetModuleFileNameW
GetCurrentThreadId
SetLastError
TlsFree
GetLastError
GlobalAlloc
GetCurrentProcess
CreateThread
CreateToolhelp32Snapshot
Process32Next
TerminateProcess
CreateProcessA
TerminateThread
OpenProcess
WaitForSingleObject
Process32First
EndUpdateResourceA
LoadLibraryExA
BeginUpdateResourceA
LockResource
GetBinaryTypeA
UpdateResourceA
LoadResource
FreeLibrary
FreeResource
FindResourceA
OpenFileMappingA
CloseHandle
UnmapViewOfFile
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
GetACP
GetCurrentDirectoryW
PeekNamedPipe
GetFileInformationByHandle
GetFullPathNameA
FlushFileBuffers
GetConsoleMode
GetConsoleCP
CreateFileW
SetFilePointer
HeapCreate
IsProcessorFeaturePresent
GetFileType
InitializeCriticalSectionAndSpinCount
GetStdHandle
SetHandleCount
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
LCMapStringW
WideCharToMultiByte
RtlUnwind
RaiseException
FreeEnvironmentStringsW
MapViewOfFile
GetStartupInfoW
HeapSetInformation
GetCommandLineA
DuplicateHandle
SetCurrentDirectoryA
GetCurrentDirectoryA
SetEnvironmentVariableA
CreateDirectoryA
ExitProcess
GetModuleHandleW
GetSystemTimeAsFileTime
FindNextFileA
DeleteFileA
HeapReAlloc
InterlockedIncrement
InterlockedDecrement
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
FindFirstFileExA
MultiByteToWideChar
HeapAlloc
user32
GetForegroundWindow
CallNextHookEx
GetKeyState
UnhookWindowsHookEx
DispatchMessageA
SetWindowsHookExA
TranslateMessage
GetMessageA
GetDesktopWindow
ReleaseDC
GetWindowTextA
GetWindowRect
MessageBoxA
GetRawInputDeviceList
IsWindowVisible
CloseClipboard
GetKeyboardLayout
GetClipboardData
EmptyClipboard
OpenClipboard
SetClipboardData
GetWindowThreadProcessId
GetDC
GetRawInputDeviceInfoA
EnumWindows
gdi32
CreateCompatibleBitmap
CreateDIBSection
BitBlt
DeleteDC
DeleteObject
SelectObject
CreateCompatibleDC
advapi32
RegOpenKeyExA
CryptHashData
CryptDestroyHash
CryptCreateHash
CryptAcquireContextA
CryptReleaseContext
CryptGetHashParam
GetTokenInformation
OpenProcessToken
RegCloseKey
RegDeleteValueA
ConvertStringSecurityDescriptorToSecurityDescriptorA
RegCreateKeyExA
RegQueryValueExA
RegSetValueExA
SetKernelObjectSecurity
shell32
ShellExecuteA
ole32
CoUninitialize
CoTaskMemFree
CoInitializeEx
CoCreateInstance
oleaut32
VariantClear
VariantInit
shlwapi
SHDeleteKeyA
wininet
InternetConnectA
InternetReadFile
InternetGetConnectedState
HttpSendRequestA
InternetOpenA
InternetCloseHandle
HttpOpenRequestA
winmm
mciSendStringA
wsock32
htons
connect
WSAStartup
send
gethostbyname
closesocket
socket
recv
iphlpapi
GetAdaptersInfo
gdiplus
GdiplusStartup
GdipSaveImageToFile
GdipCloneImage
GdiplusShutdown
GdipFree
GdipAlloc
GdipGetImageEncodersSize
GdipDisposeImage
GdipCreateBitmapFromHBITMAP
GdipGetImageEncoders
mpr
WNetOpenEnumA
WNetEnumResourceA
WNetCloseEnum
Sections
.text Size: 156KB - Virtual size: 156KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ