Static task
static1
Behavioral task
behavioral1
Sample
fd692b98844edebed8eda082053c48cfb9687a42896bb348a329bd91b5101520.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fd692b98844edebed8eda082053c48cfb9687a42896bb348a329bd91b5101520.exe
Resource
win10v2004-20220812-en
General
-
Target
fd692b98844edebed8eda082053c48cfb9687a42896bb348a329bd91b5101520
-
Size
5.9MB
-
MD5
dcb61d68ee2db2bda8cc8fa8c2e87357
-
SHA1
15e9b595b197dfad9e8472e0972ac2059fbaa3ba
-
SHA256
fd692b98844edebed8eda082053c48cfb9687a42896bb348a329bd91b5101520
-
SHA512
e979ea65912a407824c326e139604d97fd3db3a21e186e51dc5cfec695deb40ccd6e6fb6a77730ee6ed1915d80b5543321a5a05bf971b96b765529dc30ab40a5
-
SSDEEP
98304:mA2Dwa5Rmj8jbA+jHCCtv6zT28cqa9jz7V2d5gCFmSBWA5V0IJKB:mA2Dl5RmIAcjOS9P7V2UtM5mIg
Malware Config
Signatures
Files
-
fd692b98844edebed8eda082053c48cfb9687a42896bb348a329bd91b5101520.exe windows x86
eecfdc541577853a77e1942fcb95346a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
ExitThread
GetCurrentProcess
InitializeCriticalSection
CreateMutexA
CloseHandle
GetLastError
GetTickCount
GetProcAddress
HeapFree
SetLastError
GetModuleHandleA
GetVersionExA
GetModuleHandleExW
Sleep
VirtualProtect
CreateFileW
HeapAlloc
GetProcessHeap
ExitProcess
GetLocalTime
FileTimeToSystemTime
DeleteCriticalSection
ResumeThread
VirtualFree
InterlockedCompareExchange
VirtualAlloc
WriteConsoleW
SetStdHandle
SetFilePointerEx
GetConsoleMode
GetConsoleCP
LCMapStringW
HeapReAlloc
LoadLibraryW
OutputDebugStringW
LoadLibraryExW
LeaveCriticalSection
EnterCriticalSection
GetModuleHandleW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
FlushFileBuffers
SetUnhandledExceptionFilter
UnhandledExceptionFilter
FreeEnvironmentStringsW
GetEnvironmentStringsW
IsProcessorFeaturePresent
RtlUnwind
GetCommandLineA
InterlockedDecrement
MultiByteToWideChar
GetStdHandle
WriteFile
GetModuleFileNameW
HeapSize
RaiseException
IsDebuggerPresent
InterlockedIncrement
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetStringTypeW
GetCurrentThreadId
WideCharToMultiByte
GetFileType
InitializeCriticalSectionAndSpinCount
GetStartupInfoW
GetModuleFileNameA
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
advapi32
RegQueryValueExA
RegOpenKeyExA
RegOpenKeyExW
RegCreateKeyExW
RegQueryInfoKeyW
RegEnumValueA
RegCreateKeyA
RegEnumKeyExW
user32
SetWindowPos
GetLastInputInfo
LoadIconW
EnumWindows
SendMessageW
DestroyWindow
GetWindowTextA
PostMessageW
CreateWindowExA
GetWindowRect
RegisterClassExW
DefWindowProcW
DispatchMessageW
LoadIconA
GetDesktopWindow
RegisterWindowMessageW
PostQuitMessage
TrackPopupMenu
RegisterWindowMessageA
UpdateWindow
GetSystemMetrics
CreateWindowExW
PeekMessageW
FindWindowA
GetDlgItem
CreatePopupMenu
RedrawWindow
MsgWaitForMultipleObjects
BringWindowToTop
GetWindowTextW
Sections
.text Size: 457KB - Virtual size: 457KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 393KB - Virtual size: 392KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5.0MB - Virtual size: 5.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ