Static task
static1
Behavioral task
behavioral1
Sample
f3fd05fdf74d60812a6f246a68e89f241da8ef7ca0b96647ab7983d626b61b90.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f3fd05fdf74d60812a6f246a68e89f241da8ef7ca0b96647ab7983d626b61b90.exe
Resource
win10v2004-20221111-en
General
-
Target
f3fd05fdf74d60812a6f246a68e89f241da8ef7ca0b96647ab7983d626b61b90
-
Size
1.4MB
-
MD5
032079d507384d22b707016778e18957
-
SHA1
52328f4808d1a1ee6e47c5922ee4a69e7302f605
-
SHA256
f3fd05fdf74d60812a6f246a68e89f241da8ef7ca0b96647ab7983d626b61b90
-
SHA512
3230f682463c284d536b58f6a03bcf0e1312b1906ce3078be70bfbb7cc2d5771b7f7742558d6a7c01416b2a3aed23167d18c48fe4d5550db657a39c4fd7d51d1
-
SSDEEP
12288:AdpJ16Gna486REllPaa5LiIU/fsh4V6jnB0KJFx+I3IxAOzK6+44EwgwIVM12cnm:AdpJxZCllMA5S0
Malware Config
Signatures
Files
-
f3fd05fdf74d60812a6f246a68e89f241da8ef7ca0b96647ab7983d626b61b90.exe windows x86
8056a0dd1801858eacfb684462e97775
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegSetValueExW
RegCreateKeyExW
RegEnumValueW
RegQueryInfoKeyW
RegOpenKeyExW
RegQueryValueExW
RegEnumKeyW
RegEnumKeyExW
RegDeleteKeyW
RegFlushKey
RegDeleteValueW
RegNotifyChangeKeyValue
kernel32
InitializeCriticalSection
GetFileAttributesW
GetModuleFileNameW
DeleteCriticalSection
CloseHandle
HeapFree
HeapAlloc
GetProcessHeap
lstrcpyW
lstrcmpW
GetWindowsDirectoryW
CompareFileTime
lstrlenA
GetVersionExW
WaitForMultipleObjects
WaitForSingleObject
SetEvent
GetCurrentThreadId
FreeLibrary
LoadLibraryW
Sleep
GetCommandLineW
CreateEventW
GetSystemInfo
GetFullPathNameW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoA
GetCommandLineA
GetVersionExA
HeapReAlloc
RtlUnwind
ExitThread
TlsSetValue
TlsGetValue
GetLastError
CreateThread
InterlockedDecrement
GetProcAddress
GetModuleHandleA
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetCurrentDirectoryW
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
TlsFree
SetLastError
TlsAlloc
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
HeapSize
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
InterlockedExchange
VirtualQuery
GetStringTypeA
GetStringTypeW
VirtualProtect
MultiByteToWideChar
IsBadReadPtr
IsBadCodePtr
SetFilePointer
LCMapStringA
LCMapStringW
GetLocaleInfoA
SetStdHandle
FlushFileBuffers
CreateFileW
SetEndOfFile
ReadFile
GetEnvironmentStrings
GetSystemDirectoryW
LeaveCriticalSection
InterlockedIncrement
EnterCriticalSection
lstrlenW
ExitProcess
gdi32
GetTextExtentPointW
user32
GetKeyState
DestroyWindow
MessageBoxA
wsprintfA
LoadStringA
SetDlgItemTextW
ShowWindow
CheckDlgButton
SetWindowTextW
ReleaseDC
GetDC
SetDlgItemInt
GetDlgItemInt
GetDlgItemTextW
CheckRadioButton
LoadIconW
SetForegroundWindow
KillTimer
SetTimer
SetFocus
CallNextHookEx
IsWindowEnabled
AdjustWindowRectEx
GetWindowRect
CreateDialogParamW
GetClientRect
UpdateWindow
PostQuitMessage
UnhookWindowsHookEx
SetWindowsHookExW
DispatchMessageW
TranslateMessage
IsDialogMessageW
PeekMessageW
MsgWaitForMultipleObjects
GetDesktopWindow
LoadStringW
MessageBoxW
GetDlgItem
SendMessageW
EnableWindow
GetWindowLongW
DialogBoxParamW
SetWindowPos
PostMessageW
EndDialog
GetFocus
wsprintfW
comctl32
ImageList_ReplaceIcon
ImageList_Create
ord17
ImageList_Destroy
comdlg32
GetSaveFileNameW
shell32
ShellExecuteW
ole32
CoInitializeSecurity
CoInitialize
CoUninitialize
CoCreateInstance
oleaut32
VariantInit
SysFreeString
SysAllocString
VariantClear
Sections
.text Size: 212KB - Virtual size: 211KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.0MB - Virtual size: 1.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: 192KB - Virtual size: 1.3MB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE