Static task
static1
Behavioral task
behavioral1
Sample
ffee07c84f9fd39c825fb4ac8f5b8d6830fd1cf6908409d41393c051e4ff03df.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ffee07c84f9fd39c825fb4ac8f5b8d6830fd1cf6908409d41393c051e4ff03df.exe
Resource
win10v2004-20220812-en
General
-
Target
ffee07c84f9fd39c825fb4ac8f5b8d6830fd1cf6908409d41393c051e4ff03df
-
Size
163KB
-
MD5
9118901701026cbc746ba456a66e2a18
-
SHA1
cd2f3484c650377d5a9b45c6f123fe374d5342ab
-
SHA256
ffee07c84f9fd39c825fb4ac8f5b8d6830fd1cf6908409d41393c051e4ff03df
-
SHA512
950f8013091563156909e6e52a6e7acf07765d1ddb92961536ba9ae556b1c8e8dbd0b82b56b99b0650d7484517b7704ccc2d270555a246c2bd00ecf56e999edd
-
SSDEEP
3072:V37jh1Yer7oUXTVfjqy49SDbwuajwf2J7pRaR9cZqCO/tUG:FvJ7oUXJf2yUSwcf2J7pRaR9cwCO/3
Malware Config
Signatures
Files
-
ffee07c84f9fd39c825fb4ac8f5b8d6830fd1cf6908409d41393c051e4ff03df.exe windows x86
73ee133cf967975ddf15390855749675
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mfc90
ord4640
ord1670
ord2277
ord4496
ord1604
ord2103
ord1935
ord301
ord3480
ord4638
ord1668
ord2274
ord611
ord3479
ord2896
ord2327
ord4385
ord4507
ord2481
ord3579
ord5761
ord6802
ord1254
ord1247
ord5750
ord6791
ord6682
ord6676
ord4029
ord4952
ord589
ord3659
ord4890
ord3110
ord6001
ord5646
ord5663
ord4981
ord4333
ord2447
ord5659
ord5657
ord3209
ord2087
ord4199
ord5813
ord6721
ord5533
ord1046
ord4165
ord6018
ord4688
ord2251
ord4733
ord6781
ord4159
ord6783
ord4409
ord4434
ord793
ord1098
ord693
ord692
ord779
ord3645
ord4648
ord2285
ord3553
ord4643
ord1698
ord2279
ord4497
ord1605
ord2105
ord6771
ord1492
ord3554
ord3244
ord4644
ord2280
ord1722
ord3487
ord4431
ord5167
ord2672
ord5852
ord4760
ord1568
ord3186
ord1258
ord333
ord1222
ord773
ord572
ord1612
ord1667
ord1145
ord443
ord3557
ord695
ord900
ord5898
ord4459
ord615
ord2691
ord3528
ord784
ord2286
ord1786
ord1723
ord4649
ord3269
ord3650
ord1144
ord2591
ord4311
ord2587
ord2480
ord4392
ord436
ord686
ord1681
ord4516
ord6023
ord5957
ord3627
ord6071
ord6584
ord2106
ord3534
ord1180
ord1268
ord3009
ord5997
ord3179
ord5753
ord6793
ord6559
ord3738
ord1555
ord579
ord5528
ord5776
ord780
ord5876
ord4236
ord6152
ord3612
ord6078
ord4527
ord4396
ord2263
ord6170
ord310
ord3477
ord524
ord367
ord1729
ord6446
ord5668
ord5666
ord958
ord963
ord967
ord965
ord969
ord2610
ord2630
ord2614
ord2620
ord2618
ord2616
ord2633
ord2628
ord2612
ord2635
ord2623
ord2605
ord2607
ord2625
ord2375
ord2368
ord1644
ord6784
ord4160
ord6782
ord3671
ord5389
ord6356
ord3218
ord1446
ord5608
ord2139
ord1792
ord1791
ord1728
ord1357
ord1358
ord6074
ord2431
ord636
ord744
ord3726
ord1061
ord1087
ord337
ord2470
ord613
ord6557
ord1252
ord6493
ord553
ord525
ord1137
ord1108
ord796
ord757
ord3940
ord798
ord2592
ord6291
ord1536
ord6048
ord590
ord2588
ord6079
ord4529
ord794
ord2069
ord4116
ord1603
ord4030
ord654
ord3346
ord6391
ord1497
ord5647
ord3277
ord4667
ord3519
ord595
ord266
ord265
ord3213
ord305
ord3178
ord6613
ord1611
ord300
ord404
ord910
ord5520
ord2539
ord941
ord945
ord1183
ord663
ord5633
ord2766
ord2978
ord3107
ord4714
ord2961
ord3135
ord2769
ord2888
ord2759
ord4066
ord4067
ord4057
ord2886
ord4334
ord4895
ord4668
ord3506
ord374
ord316
ord820
ord639
ord405
ord2209
ord3390
ord817
ord6740
ord664
ord3987
ord1938
ord2057
ord5615
ord4617
ord5152
ord5309
ord4993
ord2208
ord1810
ord1809
ord1678
ord3344
ord6388
ord1755
ord1752
ord4331
ord1496
ord4650
ord5585
ord2074
ord5497
ord6780
ord4589
ord5636
ord3732
ord1692
ord947
ord5139
ord601
ord2206
ord800
ord1276
msvcr90
strcat_s
strlen
strcpy_s
sprintf
_time64
memcpy_s
strftime
strcpy
free
_resetstkoflw
labs
atoi
memset
_localtime64_s
_setmbcp
_invalid_parameter_noinfo
_CxxThrowException
??1exception@std@@UAE@XZ
??0exception@std@@QAE@XZ
??0exception@std@@QAE@ABV01@@Z
calloc
_recalloc
??0exception@std@@QAE@ABQBD@Z
?what@exception@std@@UBEPBDXZ
malloc
sscanf
_except_handler4_common
_unlock
__dllonexit
_encode_pointer
_lock
_onexit
_decode_pointer
_amsg_exit
__getmainargs
_cexit
_exit
_XcptFilter
_ismbblead
exit
_acmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
?terminate@@YAXXZ
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_invoke_watson
_controlfp_s
__CxxFrameHandler3
kernel32
DeleteCriticalSection
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStartupInfoA
InterlockedCompareExchange
MultiByteToWideChar
GetTempPathA
GetModuleFileNameA
EnterCriticalSection
LeaveCriticalSection
ExitProcess
FreeLibrary
WinExec
InterlockedExchange
Sleep
GetModuleHandleA
LoadLibraryA
GetProcAddress
GetLastError
SetLastError
lstrlenA
lstrcpyA
GetPrivateProfileStringA
WritePrivateProfileStringA
InitializeCriticalSection
user32
SetCursor
GetFocus
IsChild
SetTimer
InflateRect
GetSystemMetrics
SetCapture
OffsetRect
DrawFrameControl
CopyRect
GetMessagePos
ScreenToClient
PtInRect
KillTimer
InvalidateRect
GetSysColor
LoadCursorA
GetParent
GetClientRect
PostMessageA
EnableWindow
SendMessageA
GetCapture
DrawTextA
UpdateWindow
GetCursor
GetActiveWindow
GetWindowRect
GetCursorPos
LoadIconA
RegisterHotKey
AppendMenuA
GetSystemMenu
DrawIcon
IsIconic
SetWindowPos
SetForegroundWindow
keybd_event
mouse_event
SetCursorPos
GetWindowTextA
EnumWindows
GetWindowLongA
GetDC
FillRect
CallWindowProcA
SetWindowLongA
DispatchMessageA
ReleaseCapture
GetMessageA
SetRect
gdi32
BitBlt
DeleteDC
CreateDIBSection
SetDIBColorTable
GetTextColor
CreateSolidBrush
GetStockObject
SelectObject
SetStretchBltMode
GetObjectA
DeleteObject
CreateFontIndirectA
GetTextExtentPoint32A
CreateRectRgnIndirect
CreateCompatibleDC
CreateCompatibleBitmap
advapi32
RegEnumValueA
RegOpenKeyA
RegOpenKeyExA
RegCloseKey
shell32
ShellExecuteA
ws2_32
gethostbyname
WSAStartup
gethostname
msvcp90
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
gdiplus
GdipDisposeImage
GdipFree
GdipAlloc
GdipCloneImage
GdipCreateBitmapFromFile
GdipCreateBitmapFromFileICM
GdiplusStartup
GdiplusShutdown
GdipDrawImageI
GdipGetImageGraphicsContext
GdipCreateBitmapFromScan0
GdipBitmapUnlockBits
GdipBitmapLockBits
GdipGetImagePalette
GdipGetImagePaletteSize
GdipGetImageWidth
GdipGetImageHeight
GdipGetImagePixelFormat
GdipDeleteGraphics
Sections
.text Size: 114KB - Virtual size: 113KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ