Static task
static1
Behavioral task
behavioral1
Sample
00fe0cacb3576be362c57d61937c724112dcc1e93599b12aa50813d2008fc421.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
00fe0cacb3576be362c57d61937c724112dcc1e93599b12aa50813d2008fc421.exe
Resource
win10v2004-20221111-en
General
-
Target
00fe0cacb3576be362c57d61937c724112dcc1e93599b12aa50813d2008fc421
-
Size
607KB
-
MD5
d10fe3704ae220aeff43c66cc87bc92e
-
SHA1
feef50e6e278ab547192b78a02019d4da13123b2
-
SHA256
00fe0cacb3576be362c57d61937c724112dcc1e93599b12aa50813d2008fc421
-
SHA512
6995bee3d8073504d4869d70d06f5497a414b8b60010248cf4cfe6c921b01b76402ba5878b74953c559b0646898fac51d016a186faec3b1ded61547b3ec050ec
-
SSDEEP
6144:TVXaglbK6aECuCkUZoFeEopi7PWTnqm5YRuvyvhMEc03U89S9GBG8QNK/YE9BQEW:T1HbK6aEzCkgoFliykaV5KIk80hr
Malware Config
Signatures
Files
-
00fe0cacb3576be362c57d61937c724112dcc1e93599b12aa50813d2008fc421.exe windows x86
368cba6523f23ed7d259d14f5f876c3f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalFree
MulDiv
OutputDebugStringA
QueryPerformanceCounter
RemoveDirectoryW
SearchPathW
SetCurrentDirectoryW
SetErrorMode
SetFileAttributesW
LocalAlloc
SetUnhandledExceptionFilter
TerminateProcess
UnhandledExceptionFilter
lstrcatW
lstrcmpiW
lstrcpyW
lstrcpynW
lstrlenW
LoadLibraryW
LoadLibraryA
InterlockedIncrement
InterlockedDecrement
GlobalFree
GlobalAlloc
GetWindowsDirectoryW
GetVersionExW
GetTickCount
GetSystemTimeAsFileTime
GetSystemDirectoryW
GetProcAddress
GetPrivateProfileStringW
GetPrivateProfileIntW
GetModuleHandleA
GetModuleFileNameW
GetLastError
GetFileAttributesW
GetExitCodeThread
GetCurrentThreadId
GetCurrentProcessId
GetCurrentProcess
GetCurrentDirectoryW
GetCommandLineW
FreeLibrary
FormatMessageW
FindNextFileW
FindFirstFileW
FindClose
ExitProcess
DeleteFileW
CreateProcessW
CreateFileMappingW
CloseHandle
CreateFileW
GetModuleHandleW
SetLastError
VirtualAlloc
user32
GetWindowRect
GetWindowTextW
InflateRect
InvalidateRect
IsChild
IsDlgButtonChecked
IsRectEmpty
IsWindowEnabled
IsWindowVisible
LoadAcceleratorsW
LoadCursorW
LoadImageW
LoadStringA
LoadStringW
MapWindowPoints
MessageBeep
MessageBoxW
MoveWindow
MsgWaitForMultipleObjects
OffsetRect
PeekMessageW
PostMessageW
PostQuitMessage
RedrawWindow
RegisterClassExW
RegisterClassW
ReleaseDC
SendDlgItemMessageW
SendMessageW
SetCursor
SetFocus
SetForegroundWindow
SetMessageQueue
SetWindowLongW
SetWindowPos
SetWindowTextW
ShowWindow
TranslateAcceleratorW
TranslateMessage
UnregisterClassW
UpdateWindow
WaitMessage
wsprintfW
GetWindowLongW
GetWindow
GetUpdateRect
GetSystemMetrics
GetSysColorBrush
GetSysColor
GetNextDlgTabItem
GetMessageW
GetLastActivePopup
GetFocus
GetDlgItem
GetDlgCtrlID
GetDesktopWindow
GetDC
GetClientRect
GetClassInfoW
FindWindowW
FillRect
ExitWindowsEx
EnumThreadWindows
EnumChildWindows
EndPaint
EndDialog
EnableWindow
DrawTextW
DrawIcon
DrawFocusRect
DrawEdge
DispatchMessageW
DialogBoxParamW
DestroyWindow
DefWindowProcW
CreateWindowExW
CreateDialogParamW
CopyRect
CheckRadioButton
CheckDlgButton
CharPrevW
CharNextW
CallWindowProcW
BringWindowToTop
BeginPaint
LoadBitmapW
SendMessageA
LoadIconW
GetParent
gdi32
StretchBlt
SetTextColor
SetMapMode
SetBkMode
SetBkColor
SelectObject
GetTextMetricsW
GetStockObject
GetObjectW
GetMapMode
GetDeviceCaps
DeleteObject
DeleteDC
CreatePatternBrush
CreateFontIndirectW
CreateCompatibleDC
CreateCompatibleBitmap
CreateBitmap
BitBlt
AddFontResourceA
GetBkColor
DPtoLP
advapi32
RegQueryValueExA
RegSetValueExW
RegQueryValueW
RegQueryValueExW
RegOpenKeyExW
RegOpenKeyExA
RegDeleteValueW
RegCreateKeyW
RegCreateKeyExW
RegCloseKey
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
RegOpenKeyW
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListW
SHGetMalloc
ShellExecuteW
ole32
CoInitialize
CoUninitialize
CoCreateInstance
shlwapi
PathIsURLW
PathIsFileSpecW
msvcrt
_wsplitpath
swscanf
setlocale
memmove
_except_handler3
_vsnwprintf
_wmakepath
_wtoi
free
malloc
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rwu0 Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 561KB - Virtual size: 560KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ