Static task
static1
Behavioral task
behavioral1
Sample
fe0ee2d6cc500224ec2703f5f3e4251b17eb6cbb0de53802e2d6f138cac40f1d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fe0ee2d6cc500224ec2703f5f3e4251b17eb6cbb0de53802e2d6f138cac40f1d.exe
Resource
win10v2004-20221111-en
General
-
Target
fe0ee2d6cc500224ec2703f5f3e4251b17eb6cbb0de53802e2d6f138cac40f1d
-
Size
521KB
-
MD5
a10110f8a135cf0931a603fbd5fc7f42
-
SHA1
5667b6799879c11b3c5394a64826dae62277eae7
-
SHA256
fe0ee2d6cc500224ec2703f5f3e4251b17eb6cbb0de53802e2d6f138cac40f1d
-
SHA512
c6a8d24dfd288eb8f0eaa180936d46e06ca9c1266c2563c3d9cd2e36c2d865c6aec2a9025f83cd41038a4db60f77724a113cc79ec980eabff0f33036922406b5
-
SSDEEP
12288:Vty9urkjHwIoTtejyDRIYj1OpwlRVWWR64SB1H8zvf7GfdX4:vsHwhsa2sRVWWR64A6zyfd
Malware Config
Signatures
Files
-
fe0ee2d6cc500224ec2703f5f3e4251b17eb6cbb0de53802e2d6f138cac40f1d.exe windows x86
1436f30520c1e61f0d24eff61f6dc995
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
ShellExecuteExA
DuplicateIcon
CheckEscapesW
ShellAboutW
SHInvokePrinterCommandA
comctl32
ImageList_GetBkColor
ImageList_Merge
CreatePropertySheetPageW
ImageList_SetDragCursorImage
InitCommonControlsEx
CreateStatusWindow
CreatePropertySheetPageA
CreateStatusWindowW
ImageList_Copy
CreateMappedBitmap
ImageList_Remove
ImageList_SetOverlayImage
user32
MessageBoxW
CreateWindowExA
SwitchToThisWindow
DispatchMessageA
RegisterClassA
ShowWindow
UnhookWindowsHookEx
RegisterClassExA
DefWindowProcW
DestroyWindow
WinHelpW
GetMenuItemInfoA
DialogBoxIndirectParamW
kernel32
GetAtomNameW
GetModuleFileNameA
GetACP
LoadLibraryA
DeleteCriticalSection
TlsSetValue
CloseHandle
EnumSystemLocalesA
GetStringTypeA
InterlockedExchange
SetStdHandle
GetCurrentThreadId
FreeEnvironmentStringsA
GetSystemTimeAsFileTime
FlushFileBuffers
CreateMutexA
OpenMutexA
HeapSize
SetHandleCount
VirtualQuery
GetCommandLineA
GetProcAddress
GetCurrentProcess
SetFilePointer
EnterCriticalSection
CompareStringW
TlsAlloc
TerminateProcess
FreeEnvironmentStringsW
GetLastError
GetEnvironmentStrings
ExitProcess
GetTimeZoneInformation
GetLocaleInfoA
IsBadWritePtr
LeaveCriticalSection
GetCPInfo
GetTickCount
SetLastError
GetLocaleInfoW
GetModuleHandleA
HeapCreate
RtlUnwind
GetSystemInfo
TlsGetValue
HeapAlloc
GetCurrentThread
HeapFree
VirtualFree
GetStdHandle
WriteFile
WideCharToMultiByte
GetEnvironmentStringsW
GetCurrentProcessId
InitializeCriticalSection
IsValidLocale
CompareStringA
HeapDestroy
GetOEMCP
GetTimeFormatA
GetStartupInfoA
QueryPerformanceCounter
LCMapStringA
ReadFile
HeapReAlloc
GetStringTypeW
GetVersionExA
TlsFree
LCMapStringW
GetUserDefaultLCID
SetEnvironmentVariableA
IsValidCodePage
VirtualAlloc
MultiByteToWideChar
VirtualProtect
UnhandledExceptionFilter
GetFileType
GetDateFormatA
Sections
.text Size: 373KB - Virtual size: 373KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 115KB - Virtual size: 114KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ