Static task
static1
Behavioral task
behavioral1
Sample
FoxitReader.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
FoxitReader.exe
Resource
win10v2004-20220901-en
General
-
Target
3ce103902b6f86c2ff0015cb4d325b0bd2c199c7c34ce25069bec69a41ef3bb0
-
Size
2.4MB
-
MD5
5353a9c62b7bf04ec6b86aeda4abb7f4
-
SHA1
18e068129e0781b9dac409b158bc347370982659
-
SHA256
3ce103902b6f86c2ff0015cb4d325b0bd2c199c7c34ce25069bec69a41ef3bb0
-
SHA512
ae3e58a86d2cba64f08217f2222375c4453132525256fd6dd2bdde5bc6e1388c411fbc61a925b5c4ea4090f505f93feba39ebb54c2532cbd11224b97b0e12ae2
-
SSDEEP
49152:UNx432L7oroDE+liOH5FPTaZDQ0RcA7hmVACm7TUtBWm23pJJNajLxVsSiEfX:U+2L7H7rr+80RcA7EVACmUtBWVJGVsDy
Malware Config
Signatures
Files
-
3ce103902b6f86c2ff0015cb4d325b0bd2c199c7c34ce25069bec69a41ef3bb0.rar
-
FoxitReader.exe.exe windows x86
51a2a06acb83cce3a7d470d35cf5f729
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapFree
CreateProcessA
TerminateProcess
CloseHandle
ExitProcess
WriteProcessMemory
ResumeThread
lstrcatA
GetThreadContext
VirtualFree
GetProcessHeap
GetProcAddress
VirtualAlloc
VirtualQueryEx
VirtualProtectEx
SetThreadContext
LoadLibraryA
GetCommandLineA
FreeLibrary
ReadProcessMemory
HeapAlloc
GetModuleFileNameA
GetModuleHandleA
Sections
.text Size: 2.4MB - Virtual size: 2.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ