Static task
static1
Behavioral task
behavioral1
Sample
fd5620d90043a3d2a8cefc0226fb0ed1dd1e2a1ea3657bb80e166f71c0df965d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
fd5620d90043a3d2a8cefc0226fb0ed1dd1e2a1ea3657bb80e166f71c0df965d.exe
Resource
win10v2004-20221111-en
General
-
Target
fd5620d90043a3d2a8cefc0226fb0ed1dd1e2a1ea3657bb80e166f71c0df965d
-
Size
351KB
-
MD5
91458c7086ecdae7abbee181188e7ff7
-
SHA1
e64f8cb987608820db4ee6fbd098fd14034afc61
-
SHA256
fd5620d90043a3d2a8cefc0226fb0ed1dd1e2a1ea3657bb80e166f71c0df965d
-
SHA512
aff041910a6e7cf1ca5011c770eda1790672eef7e36eb2412044b37751786d3a707ab2ca11ccc2adf6dc36244d61364610159530f189512a5d282e96818fdea5
-
SSDEEP
6144:Qajim2UMkGolvCnITy0LBBL0NKrGWBGk9uhzRs1VQMpLEGBL3cxZo:Qamm2SGolvCFUBLnrGWBZc9qQ5GBbczo
Malware Config
Signatures
Files
-
fd5620d90043a3d2a8cefc0226fb0ed1dd1e2a1ea3657bb80e166f71c0df965d.exe windows x86
b3b86b61eafc3de9309e7556f7f7e0a6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDiskFreeSpaceA
GetModuleHandleA
lstrcatW
GetCurrentDirectoryA
GetDiskFreeSpaceExA
CloseHandle
GlobalReAlloc
lstrcpyW
lstrcpyA
FlushFileBuffers
SetStdHandle
GetStringTypeW
LCMapStringW
MultiByteToWideChar
GetConsoleMode
GetConsoleCP
SetFilePointer
RtlUnwind
IsValidCodePage
GetCPInfo
GetOEMCP
GetACP
HeapFree
HeapQueryInformation
HeapSize
HeapReAlloc
HeapCreate
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
GetSystemTimeAsFileTime
GetCurrentProcessId
RemoveDirectoryA
GetLongPathNameA
GetProcAddress
GetThreadLocale
SetLastError
GetLastError
SetThreadLocale
GetStartupInfoA
CreateDirectoryA
GetShortPathNameA
lstrlenW
GetVersionExW
FormatMessageW
WideCharToMultiByte
GlobalAlloc
GetCurrentProcess
HeapAlloc
RtlCaptureContext
CreateFileA
GetEnvironmentVariableW
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
CreateFileW
LoadLibraryW
ExitProcess
GetModuleHandleW
OutputDebugStringW
GetFileType
WriteConsoleW
OutputDebugStringA
WriteFile
GetStdHandle
IsProcessorFeaturePresent
IsBadReadPtr
HeapValidate
InitializeCriticalSectionAndSpinCount
RaiseException
GetStartupInfoW
HeapSetInformation
GetFullPathNameA
GetCommandLineA
GetModuleFileNameW
EncodePointer
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
DecodePointer
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
user32
UpdateWindow
LoadImageA
SetCaretPos
GetSystemMetrics
MessageBoxW
DispatchMessageA
ModifyMenuA
CheckMenuItem
IsWindowVisible
EndPaint
DestroyWindow
GetMessageA
GetWindowRect
PostQuitMessage
SendDlgItemMessageA
KillTimer
DrawTextA
LoadStringA
GetClientRect
SendMessageA
ShowCaret
BeginPaint
GetDC
TranslateMessage
InvalidateRect
GetAltTabInfoA
EnableMenuItem
GetMenuState
GetDlgItem
DefWindowProcA
SetWindowPos
GetCursorPos
CreateCaret
IsWindow
gdi32
StretchBlt
MoveToEx
LineTo
SetTextColor
DeleteDC
TextOutA
SetBkColor
DeleteObject
SelectObject
CreateCompatibleDC
Rectangle
CreatePen
GetTextMetricsA
GetObjectA
GetStockObject
CreateSolidBrush
advapi32
RegCloseKey
RegQueryInfoKeyA
RegCreateKeyExA
RegQueryValueExA
shell32
SHGetFolderPathW
ExtractIconA
SHCreateDirectoryExW
ole32
CoInitialize
CoUninitialize
oleaut32
RegisterActiveObject
netapi32
NetApiBufferFree
NetUserEnum
psapi
EnumDeviceDrivers
GetDeviceDriverFileNameA
GetDeviceDriverBaseNameA
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
shlwapi
SHCreateStreamOnFileW
imm32
ImmGetContext
dbghelp
SymGetSymFromAddr
SymInitialize
Sections
.text Size: 203KB - Virtual size: 202KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 128KB - Virtual size: 127KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ