Static task
static1
Behavioral task
behavioral1
Sample
fccba6181efbc51cfe6f1005fce049de6733bffe0352b462c2fce759ef6b8f13.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fccba6181efbc51cfe6f1005fce049de6733bffe0352b462c2fce759ef6b8f13.exe
Resource
win10v2004-20220812-en
General
-
Target
fccba6181efbc51cfe6f1005fce049de6733bffe0352b462c2fce759ef6b8f13
-
Size
189KB
-
MD5
0c794ed359dc4a5cc6df5da2d7e02d20
-
SHA1
89bf63df29767e13670eff647711821feabf222e
-
SHA256
fccba6181efbc51cfe6f1005fce049de6733bffe0352b462c2fce759ef6b8f13
-
SHA512
2df0c99a52db2eaf5f23304fddefaf32c82eda523fb647839ad345102d14f9c06c23711e27500ddad1e9f09e6f802268cb90b9880bc17aae1148095fae6c1d99
-
SSDEEP
3072:2BUNOBYJKDPTUz9wOmIoy1YyVkUUPuE3M87GDasbyqaxXDZH:aVBYJ8PTU5wItfX2qDas+lx
Malware Config
Signatures
Files
-
fccba6181efbc51cfe6f1005fce049de6733bffe0352b462c2fce759ef6b8f13.exe windows x86
5306e78d9a38bef91e8c973c78a22f3e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnterCriticalSection
ExitProcess
ExitThread
ExpandEnvironmentStringsA
FileTimeToDosDateTime
FileTimeToLocalFileTime
FindClose
FindFirstFileA
FindNextFileA
FormatMessageA
FreeLibrary
GetCommState
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDiskFreeSpaceA
GetDriveTypeA
GetEnvironmentVariableA
GetFileAttributesA
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetProcessHeap
GetStartupInfoA
GetSystemDirectoryA
GetSystemTimeAsFileTime
GetTempFileNameA
GetTempPathA
GetTickCount
GetVersion
GetVersionExA
GetWindowsDirectoryA
HeapAlloc
HeapFree
DeviceIoControl
IsDBCSLeadByte
LeaveCriticalSection
LoadLibraryExA
LocalAlloc
LocalFree
MapViewOfFile
MultiByteToWideChar
OpenFileMappingA
OpenProcess
QueryPerformanceCounter
ResetEvent
SetCommState
SetCommTimeouts
SetCurrentDirectoryA
SetErrorMode
SetEvent
SetFileAttributesA
SetFilePointer
SetLastError
SetUnhandledExceptionFilter
TerminateProcess
UnhandledExceptionFilter
UnmapViewOfFile
WaitForMultipleObjects
WaitForSingleObject
WideCharToMultiByte
WriteFile
lstrcatA
lstrcmpA
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
lstrlenW
DeleteFileA
DeleteCriticalSection
DebugBreak
CreateThread
CreateProcessA
CreateMutexA
CreateFileMappingA
CreateFileA
CreateEventA
CreateDirectoryA
CopyFileA
CloseHandle
VirtualAlloc
ReadFile
LoadLibraryA
InitializeCriticalSection
GetProcAddress
user32
GetParent
GetSysColor
GetWindowLongA
GetWindowRect
InvalidateRect
IsWindow
LoadImageA
LoadStringA
MessageBoxA
PostMessageA
RedrawWindow
ReleaseDC
ScreenToClient
SendDlgItemMessageA
SendMessageA
SetFocus
SetForegroundWindow
GetDlgItem
SetWindowLongA
SetWindowPos
SystemParametersInfoA
wsprintfA
DialogBoxParamA
CopyRect
CharLowerA
LoadIconW
GetClientRect
PostQuitMessage
DefWindowProcA
LoadIconA
LoadCursorA
RegisterClassExA
CreateWindowExA
ShowWindow
UpdateWindow
GetDC
FindWindowA
ExitWindowsEx
EnumThreadWindows
EnumChildWindows
EndDialog
SetTimer
DispatchMessageA
TranslateMessage
GetMessageA
EnableWindow
gdi32
MoveToEx
CreateEnhMetaFileA
Rectangle
LineTo
CloseEnhMetaFile
PlayEnhMetaFile
DeleteEnhMetaFile
GetStockObject
comdlg32
GetOpenFileNameA
advapi32
RegOpenKeyExW
shell32
SHBrowseForFolderA
SHGetDesktopFolder
SHGetFileInfoA
SHGetMalloc
SHGetPathFromIDListA
SHGetSpecialFolderLocation
ole32
CoTaskMemFree
CoUninitialize
OleInitialize
OleUninitialize
CoInitialize
CoCreateInstance
CLSIDFromString
CoTaskMemAlloc
comctl32
CreatePropertySheetPageA
InitCommonControlsEx
PropertySheetA
Sections
.text Size: 180KB - Virtual size: 179KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 976B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ