Static task
static1
Behavioral task
behavioral1
Sample
fa13aece929c176af33e201558a226c17f4960d7b50ffefa44dc9be024e1a4a8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fa13aece929c176af33e201558a226c17f4960d7b50ffefa44dc9be024e1a4a8.exe
Resource
win10v2004-20220812-en
General
-
Target
fa13aece929c176af33e201558a226c17f4960d7b50ffefa44dc9be024e1a4a8
-
Size
184KB
-
MD5
05104c6647d03d3c17d18a56df770d2a
-
SHA1
24024ea50d9d9bb8f7e1f6cf60fd8deaeb97d346
-
SHA256
fa13aece929c176af33e201558a226c17f4960d7b50ffefa44dc9be024e1a4a8
-
SHA512
7d570ba528e2f8ca1f9900de7570d042bc92e317becdda9319e432df391d88e29ab75c2362f310d62b7725a090ff74910284bc3b48f6d390309de02522d1625c
-
SSDEEP
3072:xf3ZM5zwheDxS7txhF7BiOk+5cOWAuE/uONr3lsT6O8vaUO/NwbX850pMIWqojEW:lpM5zwQSJxhdBiOk+5cOv/uOR46O8v5Q
Malware Config
Signatures
Files
-
fa13aece929c176af33e201558a226c17f4960d7b50ffefa44dc9be024e1a4a8.exe windows x86
7eac9c91be4e3b907d97923e4883d5c0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
CoGetProcessIdentifier
GetRunningObjectTable
CoTaskMemFree
CoTaskMemAlloc
CoInitialize
StringFromGUID2
CoCreateInstance
CoUninitialize
CoFreeUnusedLibraries
CreateItemMoniker
shlwapi
PathAddBackslashW
PathFindExtensionW
PathRemoveExtensionW
PathGetDriveNumberW
PathFileExistsW
PathFindFileNameW
ddraw
DirectDrawCreateEx
user32
SendMessageW
SetTimer
RegisterClassExW
DefWindowProcW
KillTimer
DestroyWindow
UnregisterDeviceNotification
LoadCursorW
CreateWindowExW
RegisterDeviceNotificationW
IsWindow
wsprintfW
kernel32
GetThreadLocale
GlobalFree
InterlockedCompareExchange
GetSystemDirectoryA
GetSystemDefaultLCID
GetSystemInfo
GetUserDefaultLangID
WideCharToMultiByte
WaitForSingleObject
GetCalendarInfoW
GetCurrentProcess
SetCurrentDirectoryA
GetEnvironmentVariableW
GetProfileStringW
CloseHandle
GetDateFormatW
GetModuleFileNameA
FindClose
TlsFree
TerminateProcess
InterlockedIncrement
CreateSemaphoreA
QueryPerformanceCounter
GetDateFormatA
DeleteFileW
FreeLibrary
GetLastError
ReleaseMutex
LocalAlloc
GetCurrentThread
GetFileSize
Sleep
FindNextFileA
UnhandledExceptionFilter
CreateMutexA
InterlockedExchange
GetCurrentDirectoryA
GetTickCount
EnterCriticalSection
ExitProcess
GetCurrentProcessId
GetSystemTimeAsFileTime
GetACP
LoadLibraryA
DeleteCriticalSection
LeaveCriticalSection
EnumResourceNamesA
lstrcmpW
TlsSetValue
GetCurrentThreadId
GetVersionExA
MultiByteToWideChar
ReadFile
InitializeCriticalSection
GetTimeFormatW
GlobalAlloc
lstrlenW
GlobalLock
GetTempPathW
GetLocaleInfoA
GetThreadPriority
IsProcessorFeaturePresent
FindFirstFileA
GetTimeFormatA
GetFileTime
GlobalSize
IsDebuggerPresent
ReleaseSemaphore
SetUnhandledExceptionFilter
GetProcAddress
GetWindowsDirectoryA
TlsGetValue
CreateFileA
GetLocalTime
GetModuleHandleA
SetThreadPriority
GlobalUnlock
RaiseException
wmvcore
WMCreateProfileManager
advapi32
RegSetValueExW
RegCreateKeyW
RegQueryValueExW
RegOpenKeyExW
RegSetValueW
RegCloseKey
RegDeleteKeyW
RegEnumKeyExW
Sections
.text Size: 105KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: 74KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 1024B - Virtual size: 248KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ