Static task
static1
Behavioral task
behavioral1
Sample
feda3af9d03f457a8cdc402e7105e73d6c57876bb60ff11e25b9d69910a430b0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
feda3af9d03f457a8cdc402e7105e73d6c57876bb60ff11e25b9d69910a430b0.exe
Resource
win10v2004-20220812-en
General
-
Target
feda3af9d03f457a8cdc402e7105e73d6c57876bb60ff11e25b9d69910a430b0
-
Size
304KB
-
MD5
0ccbfc908a623954f45de3d21b39edb0
-
SHA1
58a92bed68ffee2b1a9b24ff43fc57913ee23834
-
SHA256
feda3af9d03f457a8cdc402e7105e73d6c57876bb60ff11e25b9d69910a430b0
-
SHA512
134ecc3665f1b093e0a5029146567c8356109372028eae6a0007630ed9eb78696fdf58db975121e25297bfbc8783a89ccc7e7049cd01134349ae2ec17817c6c4
-
SSDEEP
6144:9d7y/mITVebNLK4kFCsznO9jNxVOVbCseOa+:/7y/Ve59kFJn0N0EO
Malware Config
Signatures
Files
-
feda3af9d03f457a8cdc402e7105e73d6c57876bb60ff11e25b9d69910a430b0.exe windows x86
80ed2f4927ab6bf6a286a99447e5aad6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
CoCreateInstance
CoTaskMemAlloc
CoTaskMemFree
user32
PostQuitMessage
SetWindowPos
IsWindow
EndPaint
GetDC
GetCursorPos
ReleaseDC
TranslateMessage
GetClientRect
DestroyWindow
GetMessageA
GetParent
DefWindowProcA
ShowWindow
EnableWindow
LoadStringA
RegisterClassA
GetWindowLongA
FillRect
DispatchMessageA
SetFocus
BeginPaint
GetSystemMetrics
PostMessageA
SetWindowLongA
SetWindowTextA
wsprintfA
GetDlgItem
LoadCursorA
GetDesktopWindow
GetSysColor
InvalidateRect
SendMessageA
oleaut32
SysFreeString
SysStringLen
VariantClear
kernel32
LocalFree
FreeLibrary
GetFullPathNameA
GetStringTypeW
DeleteFileW
FormatMessageW
lstrlenA
GetVersion
GetStdHandle
GetConsoleOutputCP
ReleaseMutex
FileTimeToSystemTime
GetFileAttributesA
WaitForSingleObject
FindFirstFileW
HeapDestroy
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
LocalAlloc
LoadLibraryExW
FreeEnvironmentStringsW
WideCharToMultiByte
LoadLibraryW
GetStringTypeA
InterlockedExchange
GetSystemTimeAsFileTime
GetOEMCP
VirtualAlloc
FindResourceA
Sleep
VirtualFree
WriteFile
UnmapViewOfFile
IsValidCodePage
CreateProcessA
SizeofResource
GetModuleHandleW
GlobalLock
GetACP
lstrcpynA
CloseHandle
ReadFile
SetFilePointer
TlsFree
MapViewOfFile
RaiseException
GetCurrentThread
GetCommandLineA
HeapSize
GetCPInfo
GetCommandLineW
LockResource
GetCurrentProcessId
GetEnvironmentStrings
FileTimeToLocalFileTime
lstrlenW
VirtualQuery
GlobalUnlock
GetEnvironmentStringsW
LCMapStringA
GlobalFree
SetStdHandle
GetLastError
LeaveCriticalSection
HeapAlloc
CreateFileA
GetFileType
CreateEventA
CreateFileW
CreateEventW
WaitForMultipleObjects
DuplicateHandle
FindNextFileA
CompareStringA
FindFirstFileA
GetProcessHeap
GetProcAddress
GetEnvironmentVariableA
SetErrorMode
GetWindowsDirectoryA
GetFileSize
GetStartupInfoA
LoadLibraryA
FlushFileBuffers
VirtualProtect
TlsAlloc
IsBadWritePtr
GetTickCount
QueryPerformanceCounter
SetEvent
GetVersionExW
lstrcmpiA
SetHandleCount
EnterCriticalSection
HeapFree
WriteConsoleW
SetCurrentDirectoryA
InterlockedIncrement
GetCurrentThreadId
GetLocaleInfoA
SetEndOfFile
GlobalAlloc
WriteConsoleA
TerminateProcess
MulDiv
SetUnhandledExceptionFilter
CreateThread
GetModuleHandleA
MultiByteToWideChar
TlsGetValue
UnhandledExceptionFilter
GetModuleFileNameA
GetVersionExA
ExitProcess
IsDebuggerPresent
GetModuleFileNameW
InitializeCriticalSection
SetLastError
FormatMessageA
InterlockedDecrement
FindClose
LoadResource
HeapReAlloc
gdi32
GetDeviceCaps
SelectObject
CreateCompatibleDC
SetTextColor
BitBlt
advapi32
RegCreateKeyExA
RegDeleteKeyA
OpenProcessToken
RegQueryValueExA
RegCloseKey
RegSetValueExA
msvcrt
free
_cexit
exit
_exit
_controlfp
Sections
.text Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 280KB - Virtual size: 276KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ