Static task
static1
Behavioral task
behavioral1
Sample
fc5c4d6f364e40e397b71542cb690faa0cb278556105b9533e0c8e22b5c2ea18.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fc5c4d6f364e40e397b71542cb690faa0cb278556105b9533e0c8e22b5c2ea18.exe
Resource
win10v2004-20220901-en
General
-
Target
fc5c4d6f364e40e397b71542cb690faa0cb278556105b9533e0c8e22b5c2ea18
-
Size
274KB
-
MD5
e39582d88f11d1303882b72e0bf35df0
-
SHA1
6b374f787efc9dc9700e9c5d04bfd16c656f3026
-
SHA256
fc5c4d6f364e40e397b71542cb690faa0cb278556105b9533e0c8e22b5c2ea18
-
SHA512
96064797dccc16e54694566ab803b003cea76fe61096ea088735295111a3428696d59cdb629c15346b69498ffab52607d04cf926ef997533859d4d037691a1c2
-
SSDEEP
6144:J9IQFOO8cZlnXS7RMaZMdJ1ZcU9RuOy5vmsEyP5YPw:i3cZlC7RMa439YOy5vmsEA5aw
Malware Config
Signatures
Files
-
fc5c4d6f364e40e397b71542cb690faa0cb278556105b9533e0c8e22b5c2ea18.exe windows x86
5da23f3498aea8fce475641ba7a2fde4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
CreateStatusWindowA
InitCommonControls
ImageList_Draw
ImageList_ReplaceIcon
InitCommonControlsEx
ImageList_AddMasked
ImageList_Destroy
CreatePropertySheetPageW
PropertySheetA
CreatePropertySheetPageA
DestroyPropertySheetPage
ImageList_Create
gdi32
CreateCompatibleDC
PtVisible
CreateDIBitmap
GetCharWidthA
SetPixelV
SetTextColor
SetBkColor
GetTextColor
SetICMMode
Polyline
StartDocA
GetTextFaceW
StrokeAndFillPath
user32
GetWindowLongW
CheckMenuItem
KillTimer
GetWindowDC
CreateWindowExW
GetSubMenu
MessageBoxW
GetSystemMenu
GetDlgItemTextW
IsRectEmpty
GetClientRect
IsDlgButtonChecked
GetWindowTextA
MapWindowPoints
GetWindowThreadProcessId
CopyRect
ScreenToClient
UnregisterClassW
MoveWindow
EnumChildWindows
TranslateMessage
SendMessageA
SetCursor
GetDlgCtrlID
GetMessageW
GetWindowTextW
IsChild
EnableWindow
LoadStringW
SetRect
comdlg32
ChooseFontW
GetFileTitleW
GetSaveFileNameA
GetOpenFileNameA
ChooseFontA
CommDlgExtendedError
GetFileTitleA
GetOpenFileNameW
GetSaveFileNameW
msvcrt
_wcsicmp
_mbsnbcpy
memmove
_controlfp
srand
_ltoa
_wtol
fwrite
printf
_write
__p___initenv
__p__fmode
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeW
GetFileVersionInfoW
GetFileVersionInfoSizeA
kernel32
GetCurrentDirectoryW
LoadLibraryA
GetFileType
GetCurrentThreadId
RaiseException
VirtualAlloc
GetLocalTime
LoadResource
GetTimeFormatA
GetCurrentProcessId
LeaveCriticalSection
GetLastError
lstrcatA
VirtualFree
GetModuleHandleW
UnmapViewOfFile
GetCommandLineW
ExitProcess
InterlockedCompareExchange
GlobalHandle
shlwapi
PathIsRootW
PathFindExtensionW
StrStrW
PathIsRelativeW
SHStrDupW
PathFindFileNameA
PathIsDirectoryW
PathRemoveExtensionW
PathRemoveBlanksW
StrStrIA
SHSetValueW
PathGetDriveNumberW
PathAddBackslashW
StrChrIW
StrCmpNIW
StrToIntW
SHDeleteKeyA
StrCatBuffW
PathRemoveFileSpecW
PathRemoveFileSpecA
AssocQueryStringW
PathIsUNCW
PathIsURLW
PathAppendW
StrCpyW
ntdll
RtlCreateAcl
RtlInitializeCriticalSection
RtlUnicodeToOemN
RtlGetNtProductType
NtWaitForSingleObject
RtlCreateSecurityDescriptor
RtlAllocateAndInitializeSid
RtlInitializeResource
RtlFreeAnsiString
RtlSetDaclSecurityDescriptor
NtQuerySystemTime
_wcsnicmp
NtOpenKey
NtQueryVolumeInformationFile
NtWriteFile
RtlFreeHeap
NtCreateEvent
RtlOemStringToUnicodeString
RtlEnterCriticalSection
NtSetInformationThread
RtlReleaseResource
RtlDosPathNameToNtPathName_U
RtlLengthRequiredSid
wcslen
NtCreateFile
RtlDeleteCriticalSection
_stricmp
NtDeviceIoControlFile
DbgPrint
advapi32
RegEnumKeyExW
FreeSid
RegFlushKey
RegEnumKeyExA
ChangeServiceConfig2A
EqualSid
LookupAccountSidW
RegQueryValueExW
GetSecurityDescriptorControl
ChangeServiceConfigA
RegEnumValueW
RegQueryValueExA
RegDeleteKeyW
RegOpenKeyExA
RegEnumValueA
InitializeSecurityDescriptor
RegQueryInfoKeyW
RegOpenKeyExW
AllocateAndInitializeSid
RegDeleteValueW
RegOpenKeyW
RegCloseKey
RegCreateKeyExA
LockServiceDatabase
RegDeleteKeyA
RegDeleteValueA
RegQueryValueW
LookupPrivilegeValueA
RegCreateKeyExW
EnumServicesStatusExA
Sections
.text Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 201KB - Virtual size: 292KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: 35KB - Virtual size: 126KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 462B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ