Static task
static1
Behavioral task
behavioral1
Sample
fcfb2a0e9be7a8f781682d977d4f247ff4885db5eaf488d1587d8cc261e47913.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fcfb2a0e9be7a8f781682d977d4f247ff4885db5eaf488d1587d8cc261e47913.exe
Resource
win10v2004-20220812-en
General
-
Target
fcfb2a0e9be7a8f781682d977d4f247ff4885db5eaf488d1587d8cc261e47913
-
Size
140KB
-
MD5
055f2e95eac6e8ab351aac9aa4b73c62
-
SHA1
3babdbfd8b1755d8e78d87c8dc02a2f1dcbfc93a
-
SHA256
fcfb2a0e9be7a8f781682d977d4f247ff4885db5eaf488d1587d8cc261e47913
-
SHA512
9d3dc5fc496902b40995d18e39d0985c433d011ff3de2fd541aab930022aecf76cdda092fd083fdef01ade10c6bd3f1693b58077ce0b8599e855679a7fabf425
-
SSDEEP
3072:qTWCqIzK1nPrdcFrBrjFX0s0Itsc0cf3Hocb7+gQmjtB:5y5rFRp0sRf3HT
Malware Config
Signatures
Files
-
fcfb2a0e9be7a8f781682d977d4f247ff4885db5eaf488d1587d8cc261e47913.exe windows x86
14dc45b916fdcb6171d922a98bd42411
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateThread
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetLocaleInfoW
GetTimeZoneInformation
SetConsoleCtrlHandler
FlushFileBuffers
SetStdHandle
GetStringTypeW
GetStringTypeA
LoadLibraryA
GetOEMCP
GetACP
SetFilePointer
GetUserDefaultLCID
EnumSystemLocalesA
GetLocaleInfoA
IsValidCodePage
IsValidLocale
GetCPInfo
WriteFile
GetCurrentThread
TlsGetValue
TlsFree
TlsAlloc
TlsSetValue
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
TerminateProcess
LCMapStringW
LCMapStringA
IsBadWritePtr
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetModuleFileNameA
FatalAppExitA
CreateFileW
PulseEvent
lstrcmpiW
TerminateThread
InterlockedIncrement
InterlockedDecrement
WideCharToMultiByte
GetSystemDirectoryW
GetCurrentThreadId
GetVersionExW
InitializeCriticalSection
CreateEventW
WaitForMultipleObjects
DeleteCriticalSection
GetCurrentProcess
GetUserDefaultLangID
GetThreadLocale
OpenEventW
SetEvent
GetSystemPowerStatus
LocalAlloc
LocalFree
FormatMessageW
GetTickCount
lstrlenW
SetLastError
FreeLibrary
lstrcpynW
EnterCriticalSection
LeaveCriticalSection
lstrcmpW
WaitForSingleObject
CloseHandle
lstrcatW
Sleep
GetModuleHandleW
lstrcpyW
GetLastError
LoadLibraryW
GetProcAddress
CreateProcessW
ExitProcess
GetVersion
GetCommandLineA
HeapAlloc
HeapFree
GetVersionExA
GetModuleHandleA
MultiByteToWideChar
RtlUnwind
user32
ReleaseDC
GetDC
SetWindowPos
SystemParametersInfoW
GetWindowRect
FindWindowW
IntersectRect
GetSystemMetrics
InvalidateRect
UnregisterDeviceNotification
RegisterDeviceNotificationW
PostQuitMessage
DefWindowProcW
RegisterClassExW
CreateWindowExW
GetMessageW
DispatchMessageW
CloseWindow
PostThreadMessageW
GetWindowThreadProcessId
GetThreadDesktop
SetThreadDesktop
OpenWindowStationW
SetProcessWindowStation
ExitWindowsEx
GetLastInputInfo
OpenInputDesktop
OpenDesktopW
GetUserObjectInformationW
CloseDesktop
MonitorFromWindow
EqualRect
GetDesktopWindow
wsprintfW
ChangeDisplaySettingsExW
GetTopWindow
GetWindow
GetClassNameW
PostMessageW
EnumDisplaySettingsW
IsRectEmpty
FindWindowExW
GetCursorPos
GetForegroundWindow
SetCursorPos
SendMessageW
SubtractRect
gdi32
CreateDCA
CreateDCW
ExtEscape
DeleteDC
advapi32
RegOverridePredefKey
RegEnumValueW
ConvertStringSidToSidW
FreeSid
RegisterServiceCtrlHandlerW
SetServiceStatus
AllocateAndInitializeSid
SetEntriesInAclW
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
StartServiceCtrlDispatcherW
RegSetKeySecurity
RegQueryInfoKeyW
RegEnumKeyExW
IsValidSid
RegGetKeySecurity
IsValidSecurityDescriptor
GetSecurityDescriptorDacl
GetAclInformation
GetAce
GetLengthSid
InitializeAcl
AddAccessAllowedAceEx
AddAce
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegDeleteKeyW
RegCreateKeyExW
RegSetValueExW
RegDeleteValueW
OpenServiceW
ControlService
QueryServiceStatus
DeleteService
OpenSCManagerW
CreateServiceW
CloseServiceHandle
RegCloseKey
GetTokenInformation
RegOpenKeyExW
RegQueryValueExW
CreateProcessAsUserW
userenv
LoadUserProfileW
UnloadUserProfile
powrprof
CallNtPowerInformation
Sections
.text Size: 100KB - Virtual size: 99KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ