Static task
static1
Behavioral task
behavioral1
Sample
fbedd19cc54be0918c4b5b8a863de816dec902476c043a19153298e259a7bac1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fbedd19cc54be0918c4b5b8a863de816dec902476c043a19153298e259a7bac1.exe
Resource
win10v2004-20220812-en
General
-
Target
fbedd19cc54be0918c4b5b8a863de816dec902476c043a19153298e259a7bac1
-
Size
162KB
-
MD5
a36f1a570c4097e9711c5d82f3128760
-
SHA1
34b828b37071edd85b0ef4638f2522a65319b61c
-
SHA256
fbedd19cc54be0918c4b5b8a863de816dec902476c043a19153298e259a7bac1
-
SHA512
cfcf55173e832518d4b92729065a5d0b45e3ee357f5f74aa3d9bd53121ed7525f245e760120187a086c70aaff49b70cf98053a8c8e0026fefe6b8fbf06def416
-
SSDEEP
3072:YPFf+RHBZl8QyJPEzes9pdXPwpzj8SgDevjlcttnTSSMp0f:FRhj8QyPd/pzj83evjwnuI
Malware Config
Signatures
Files
-
fbedd19cc54be0918c4b5b8a863de816dec902476c043a19153298e259a7bac1.exe windows x86
75c6200c008a2c9f3a449743c68b54f4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetThreadContext
IsSystemResumeAutomatic
ExitProcess
CreateFileA
HeapAlloc
HeapFree
GetWindowsDirectoryA
GetProcessTimes
HeapDestroy
HeapCreate
ReadFile
lstrcatA
CloseHandle
DeleteFileA
lstrcpyA
GetPrivateProfileStructA
ConnectNamedPipe
WriteFile
CreateProcessA
user32
GetClipboardViewer
GetActiveWindow
IsCharAlphaA
MapVirtualKeyA
LoadAcceleratorsW
IsWindowUnicode
shell32
ord98
comctl32
ImageList_Copy
ImageList_Create
ord17
msvcrt
_except_handler3
Sections
.text Size: 92KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 476KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ