Static task
static1
Behavioral task
behavioral1
Sample
fb4a50380ef585ed3efc55813f84d6fd38167d4170a0643e1cfda8811c51bce9.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
fb4a50380ef585ed3efc55813f84d6fd38167d4170a0643e1cfda8811c51bce9.exe
Resource
win10v2004-20221111-en
General
-
Target
fb4a50380ef585ed3efc55813f84d6fd38167d4170a0643e1cfda8811c51bce9
-
Size
227KB
-
MD5
1af4b05fcd6c1d582f88331ee139d666
-
SHA1
2927b8db7ff78ed8b1dada80967ebab4a39d906b
-
SHA256
fb4a50380ef585ed3efc55813f84d6fd38167d4170a0643e1cfda8811c51bce9
-
SHA512
4156c8eb36e08a81c31c7f73851f8b1e951193d7f93a8d9de496fdb1a26b14e2cb3073052fbc8f1d8ad0b31151ac6e83c775d20aea4c9885a6c49fb0bbda38ad
-
SSDEEP
3072:Ido/tQMM7dQ5fkGl1an/xDmWCcTdKRtxK+EeDSuC3Q:IGidQ5fVan4WCcgRtc6DU3Q
Malware Config
Signatures
Files
-
fb4a50380ef585ed3efc55813f84d6fd38167d4170a0643e1cfda8811c51bce9.exe windows x86
3a7579b12739dc27ab68f29553a5e2b7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ResumeThread
SetThreadContext
VirtualProtectEx
WriteProcessMemory
VirtualAllocEx
GetProcAddress
GetModuleHandleA
ReadProcessMemory
GetThreadContext
CreateProcessA
CloseHandle
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetFileSize
CreateFileA
GetModuleFileNameA
GetStartupInfoA
GetCommandLineA
GetVersionExA
HeapAlloc
RaiseException
HeapFree
GetLastError
EnterCriticalSection
LeaveCriticalSection
ReadFile
SetFilePointer
LoadLibraryA
DebugBreak
ExitProcess
TerminateProcess
GetCurrentProcess
WriteFile
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
TlsAlloc
SetLastError
GetCurrentThreadId
TlsFree
TlsSetValue
TlsGetValue
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
HeapSize
SetUnhandledExceptionFilter
SetStdHandle
FlushFileBuffers
RtlUnwind
InterlockedExchange
VirtualQuery
InitializeCriticalSection
GetProcessHeap
FreeLibrary
GetACP
GetOEMCP
GetCPInfo
IsBadCodePtr
SetEndOfFile
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
VirtualProtect
GetSystemInfo
Sections
.text Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ