Static task
static1
Behavioral task
behavioral1
Sample
fb2a003f794d5a89fc89f2f79896956f5318784eeb0f85dc693f2c820a3917f1.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
fb2a003f794d5a89fc89f2f79896956f5318784eeb0f85dc693f2c820a3917f1.exe
Resource
win10v2004-20220812-en
General
-
Target
fb2a003f794d5a89fc89f2f79896956f5318784eeb0f85dc693f2c820a3917f1
-
Size
247KB
-
MD5
3f2e9b727a1f40844dfa13568ada02b0
-
SHA1
d850a1e2afb4f4b88e837842365d41e89ed1391e
-
SHA256
fb2a003f794d5a89fc89f2f79896956f5318784eeb0f85dc693f2c820a3917f1
-
SHA512
2b07263e3eab5150ae990b87982f8cc0485c8a1abe146bb1a9d05e1605fc3de09f4d6decb2f1d62d0664354a31f9ee96b3289dc306c33d97cd4738eda5ff39ae
-
SSDEEP
3072:mfTmUM6nW6pRfNNQKPWDyDI0hJltZrpRRynnXUOrk23QDAAhLm7w2cthz36Mdk3:kTmUMA7NSDyDISthp8Uf14
Malware Config
Signatures
Files
-
fb2a003f794d5a89fc89f2f79896956f5318784eeb0f85dc693f2c820a3917f1.exe windows x86
77a0931f76ff2d733a3bcac388b5a8e4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
_XcptFilter
_exit
ftell
fflush
_wcsrev
_fcloseall
wcsncpy
_wcslwr
_wcsicmp
wcsstr
_wcsupr
wcslen
wcscat
_wfopen
fseek
fread
fclose
wcscmp
exit
wcsrchr
wcscpy
fwrite
??3@YAXPAX@Z
??2@YAPAXI@Z
_itoa
kernel32
GetStartupInfoA
GetModuleHandleA
LocalAlloc
LocalFree
CompareFileTime
GetSystemDirectoryW
GetFileTime
SetFileTime
CreateDirectoryW
GetSystemTime
FindFirstFileW
FindNextFileW
FindClose
MultiByteToWideChar
GetDriveTypeW
GetFileAttributesA
GetModuleFileNameA
GetTempPathW
WideCharToMultiByte
WriteFile
LockResource
GetFileAttributesW
LoadResource
SizeofResource
FindResourceW
CreateMutexW
SetThreadPriority
GetCurrentThread
GetCurrentProcess
SetPriorityClass
GetEnvironmentVariableW
GetShortPathNameW
Sleep
CreateProcessW
GetStartupInfoW
CloseHandle
SetEndOfFile
SetFilePointer
GetFileSize
CreateFileW
DeleteFileW
SetFileAttributesW
CopyFileW
GetLastError
GetModuleFileNameW
SetCurrentDirectoryW
GetWindowsDirectoryW
CreateThread
GetProcAddress
LoadLibraryW
GetCurrentDirectoryW
user32
TranslateMessage
GetMessageW
RegisterClassExW
LoadCursorW
LoadIconW
GetDesktopWindow
UpdateWindow
CreateWindowExW
DefWindowProcW
wsprintfW
DispatchMessageW
advapi32
SetSecurityDescriptorOwner
IsValidSecurityDescriptor
AccessCheck
RevertToSelf
FreeSid
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
SetSecurityDescriptorGroup
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
InitializeSecurityDescriptor
AllocateAndInitializeSid
OpenProcessToken
OpenThreadToken
ImpersonateSelf
shell32
SHGetPathFromIDListW
ShellExecuteA
ShellExecuteW
ShellExecuteExW
SHChangeNotify
SHGetMalloc
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ole32
CoUninitialize
CoTaskMemFree
CoInitialize
CoCreateInstance
Sections
.text Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 3KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 119KB - Virtual size: 200KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE