Static task
static1
Behavioral task
behavioral1
Sample
fbf0d9c6da35f0b74336c1b592793120e54798c305df7ae9d088aaabbdf34206.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
fbf0d9c6da35f0b74336c1b592793120e54798c305df7ae9d088aaabbdf34206.exe
Resource
win10v2004-20220901-en
General
-
Target
fbf0d9c6da35f0b74336c1b592793120e54798c305df7ae9d088aaabbdf34206
-
Size
496KB
-
MD5
84bfbe077ebc25dc38977e8e28924e70
-
SHA1
4c83209903d59ea6066063f0401bc43959bd29ba
-
SHA256
fbf0d9c6da35f0b74336c1b592793120e54798c305df7ae9d088aaabbdf34206
-
SHA512
8cee8cb55c5974a8af724531c4457b6d429db90714c286f8082303269ac1af85683da6de5d7323ade842b3a6a939699997eac7df013a798a642af1b4b831e95a
-
SSDEEP
3072:AgqdxnCG2Um0m/9AJvsQPSN2LhaMstRyksIz0S66t4dRk3NIkII4RKodFWUIEP11:7I2U4VIqwUM3Sf4HYzo0naG6
Malware Config
Signatures
Files
-
fbf0d9c6da35f0b74336c1b592793120e54798c305df7ae9d088aaabbdf34206.exe windows x86
4450b53726ee9c67ff8c34237d39a8b1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemDirectoryA
GetModuleHandleA
CreateThread
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
lstrcatA
CreateMutexA
SetErrorMode
GetModuleFileNameA
GetCurrentDirectoryA
GetCurrentProcess
CreateFileA
GetFileSize
ReadFile
CloseHandle
lstrlenA
lstrcpyA
FindFirstFileA
FindClose
GetLastError
lstrcmpiA
GetVersionExA
LoadLibraryA
GetProcAddress
GetProcessHeap
SetEndOfFile
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
SetFilePointer
FlushFileBuffers
SetStdHandle
InterlockedExchange
RtlUnwind
HeapReAlloc
VirtualAlloc
InitializeCriticalSection
GetCPInfo
GetOEMCP
GetACP
LCMapStringW
MultiByteToWideChar
LCMapStringA
VirtualQuery
GetSystemInfo
VirtualProtect
FreeLibrary
GetWindowsDirectoryA
OutputDebugStringA
lstrcpynA
GetStartupInfoA
GetCommandLineA
GetLocalTime
ExitProcess
WriteFile
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
TlsFree
SetLastError
TlsSetValue
TlsGetValue
TlsAlloc
HeapDestroy
HeapCreate
VirtualFree
HeapFree
EnterCriticalSection
LeaveCriticalSection
HeapAlloc
advapi32
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
RegDeleteValueA
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
AdjustTokenPrivileges
gdi32
GetDeviceCaps
CreateFontIndirectA
SelectObject
CreateCompatibleDC
DeleteDC
StretchBlt
GetObjectA
DeleteObject
user32
MessageBoxA
LoadStringA
LoadImageA
wsprintfA
SystemParametersInfoA
SendDlgItemMessageA
SetWindowTextA
GetWindowLongA
PostMessageA
GetParent
SetDlgItemTextA
GetDlgItem
SendMessageA
ShowWindow
SetWindowLongA
GetAsyncKeyState
ExitWindowsEx
EnumWindows
GetWindowTextA
GetClassNameA
SetForegroundWindow
SetFocus
CharLowerA
GetDC
ReleaseDC
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
comctl32
CreatePropertySheetPageA
PropertySheetA
ord17
Sections
.text Size: 49KB - Virtual size: 49KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 3KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 442KB - Virtual size: 442KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ