Static task
static1
Behavioral task
behavioral1
Sample
fbf869f22e81b83324ab85909ca001554d3e864e2835397f0bf262f66ecb9a93.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fbf869f22e81b83324ab85909ca001554d3e864e2835397f0bf262f66ecb9a93.exe
Resource
win10v2004-20220901-en
General
-
Target
fbf869f22e81b83324ab85909ca001554d3e864e2835397f0bf262f66ecb9a93
-
Size
108KB
-
MD5
4b04bad122745609892ad407e19a5671
-
SHA1
01da78f8978f07ebde1dfe4dfaa1851f974a4b9d
-
SHA256
fbf869f22e81b83324ab85909ca001554d3e864e2835397f0bf262f66ecb9a93
-
SHA512
2516ebbc615ff17b65f7f163daa063d0bab6ad66c68b10b2ca1c72675234a4b348f091ec7bd7911e11cded29c0116a49133208e4e4f5c88623dfc25fd7f308d0
-
SSDEEP
1536:l0DE46cAqy8atc+ihhf7NvulKdohgf7/GPdOUSlzKln4W8NpTLPz2:l0DEKK8gMhb0hgT/agKjypLPz2
Malware Config
Signatures
Files
-
fbf869f22e81b83324ab85909ca001554d3e864e2835397f0bf262f66ecb9a93.exe windows x86
f7ed741d5d20262c88933eb04eab61a2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStdHandle
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
GetLastError
InterlockedDecrement
HeapCreate
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
GetConsoleCP
GetConsoleMode
EnterCriticalSection
LeaveCriticalSection
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapFree
Sleep
MultiByteToWideChar
InterlockedExchange
LoadLibraryW
RtlUnwind
SetStdHandle
WriteConsoleW
LCMapStringW
GetStringTypeW
HeapAlloc
HeapReAlloc
IsProcessorFeaturePresent
HeapSize
CreateFileW
FlushFileBuffers
MapViewOfFile
UnmapViewOfFile
GlobalAlloc
RaiseException
GlobalFree
OpenFileMappingA
GlobalReAlloc
lstrlenA
lstrcpynA
lstrcatA
lstrlenW
WriteFile
WaitForSingleObject
SetEvent
CreateFileA
GetFileSize
ReadFile
Thread32First
Thread32Next
VirtualProtect
CreateToolhelp32Snapshot
GetThreadContext
SetThreadContext
InterlockedCompareExchange
FlushInstructionCache
OpenThread
SuspendThread
ResumeThread
VirtualFree
VirtualAlloc
VirtualQuery
ExitProcess
GetModuleHandleW
EncodePointer
DecodePointer
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStartupInfoW
HeapSetInformation
GetCommandLineA
GetTimeZoneInformation
CompareStringW
CreateThread
CloseHandle
OpenProcess
lstrcmpiA
GetTickCount64
GetTickCount
LoadLibraryA
GetProcAddress
FreeLibrary
SetEnvironmentVariableA
user32
SendDlgItemMessageA
GetMessageW
TranslateAcceleratorW
SetWindowLongW
SendMessageTimeoutW
CreateDialogParamW
IsWindow
GetWindowThreadProcessId
DispatchMessageW
GetClassNameA
PostMessageW
FindWindowExA
SendMessageTimeoutA
SendMessageA
EnumWindows
TranslateMessage
LoadAcceleratorsW
KillTimer
PostQuitMessage
SetTimer
MessageBoxA
DestroyWindow
shell32
ShellExecuteExA
Sections
.text Size: 77KB - Virtual size: 77KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 584B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ