Static task
static1
Behavioral task
behavioral1
Sample
fbc874912544cae21543cf90da771aa402de5ac89e54023a863ba7be069c32e8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fbc874912544cae21543cf90da771aa402de5ac89e54023a863ba7be069c32e8.exe
Resource
win10v2004-20220901-en
General
-
Target
fbc874912544cae21543cf90da771aa402de5ac89e54023a863ba7be069c32e8
-
Size
126KB
-
MD5
312656d53043666ce7c1e5c90507462b
-
SHA1
8057d016d97fee9cfd076992c166747723c96a4e
-
SHA256
fbc874912544cae21543cf90da771aa402de5ac89e54023a863ba7be069c32e8
-
SHA512
583b47b28a5ed7b8f05d502f5947e9b32bc42f07af919032cd4bc68abab82fb0329557dd4a64d24633ddbd488684c1ac3374bc302bced627378987657528bec3
-
SSDEEP
3072:yrP+VJuR7qqZtHq8c3xkj2WqNXYCHv0fkG2RJm:yjq4WmtKrij2D6CH0E
Malware Config
Signatures
Files
-
fbc874912544cae21543cf90da771aa402de5ac89e54023a863ba7be069c32e8.exe windows x86
54bd78cb00ff648b3e8e4f404e8b684c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetLogicalDriveStringsA
GetCommMask
CloseHandle
CommConfigDialogA
CancelIo
GetProcAddress
GetFileAttributesA
PeekNamedPipe
AreFileApisANSI
LocalReAlloc
LocalCompact
WaitForMultipleObjectsEx
GetThreadPriorityBoost
IsBadHugeReadPtr
HeapDestroy
GetBinaryTypeA
ReleaseSemaphore
LoadResource
GetLastError
VirtualProtect
ConnectNamedPipe
GlobalHandle
GetSystemDefaultLCID
CopyFileExA
GetLongPathNameA
WaitForSingleObject
ReleaseMutex
UpdateResourceA
MulDiv
MapViewOfFile
GetStdHandle
GetEnvironmentVariableA
CreateFileA
EraseTape
GetHandleInformation
DeviceIoControl
LocalFree
GetThreadLocale
ReadProcessMemory
GetDriveTypeA
IsProcessorFeaturePresent
GetPrivateProfileStructA
GetProcessAffinityMask
OpenFileMappingA
WriteFile
GetCurrentProcessId
OpenMutexA
OpenProcess
HeapReAlloc
GetVersion
GetCurrentProcess
GetFileTime
UnlockFile
CreateConsoleScreenBuffer
GetMailslotInfo
WritePrivateProfileSectionA
GetThreadContext
FreeResource
DuplicateHandle
FindAtomA
VirtualProtectEx
HeapFree
IsBadReadPtr
MoveFileA
GetPrivateProfileSectionNamesA
GetModuleFileNameA
WriteProfileSectionA
GetShortPathNameA
GlobalCompact
GetCommTimeouts
ReadFile
DefineDosDeviceA
GetLocalTime
DeleteFiber
GetConsoleCP
CallNamedPipeA
FindClose
GetCPInfoExA
GetWindowsDirectoryA
CreateEventA
ResetEvent
GetTickCount
GetProfileIntA
PeekConsoleInputA
FreeLibrary
DisconnectNamedPipe
LoadLibraryExA
PostQueuedCompletionStatus
GetVolumeInformationA
DeleteFileA
HeapCreate
ContinueDebugEvent
GlobalSize
DeleteAtom
CopyFileA
FlushViewOfFile
GlobalFix
GetSystemDefaultUILanguage
PurgeComm
ReadConsoleA
GlobalFlags
WriteProcessMemory
GetCurrentThreadId
LocalUnlock
GetProcessVersion
MultiByteToWideChar
LocalSize
VirtualQueryEx
VirtualUnlock
QueryPerformanceCounter
GetTempPathA
IsValidCodePage
LoadLibraryA
AddAtomA
CreateDirectoryExA
CreateRemoteThread
SizeofResource
SetFileAttributesA
GetPrivateProfileSectionA
GetPrivateProfileStringA
FlushFileBuffers
CreateSemaphoreA
EndUpdateResourceA
IsBadHugeWritePtr
GlobalWire
GetSystemDirectoryA
GetPriorityClass
SetErrorMode
WaitForMultipleObjects
GetProfileStringA
LocalFlags
GetModuleHandleA
GetFileInformationByHandle
VirtualAlloc
GetExitCodeProcess
FreeConsole
GetACP
HeapValidate
GetProfileSectionA
LockResource
GetProcessWorkingSetSize
BeginUpdateResourceA
Beep
FoldStringA
GlobalAlloc
GetUserDefaultLangID
GetCommandLineA
GetStartupInfoA
msvcrt
srand
__set_app_type
_controlfp
exit
strstr
Sections
.text Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE