Static task
static1
Behavioral task
behavioral1
Sample
fdd2a4d80a1e27f0ec8d5fdc0f04ef8f0b46987afd3a4ea4cfab3e7d8c7f0823.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fdd2a4d80a1e27f0ec8d5fdc0f04ef8f0b46987afd3a4ea4cfab3e7d8c7f0823.exe
Resource
win10v2004-20221111-en
General
-
Target
fdd2a4d80a1e27f0ec8d5fdc0f04ef8f0b46987afd3a4ea4cfab3e7d8c7f0823
-
Size
396KB
-
MD5
8a1ece4df876e913584dc3888573d755
-
SHA1
0cabedf56399ba7d6d5ce034cc7250ef7a9de03b
-
SHA256
fdd2a4d80a1e27f0ec8d5fdc0f04ef8f0b46987afd3a4ea4cfab3e7d8c7f0823
-
SHA512
4b7f9c01c45a96a64245e03f3fc778649149a2a449f838928dcf69b55ae2de7a831bb468c9b2e2ac3cd4e28d681e63fee3447dfaf7f9048c6a8f56e777855c0c
-
SSDEEP
6144:Jl+a8MczCvMRxRZfuXeqTYa8919N7CXVwjoFm3reLJWUxMPbAyUUFo9WBr:JF8Mj4Pfu1YdtN7aVwDKLj7EoU
Malware Config
Signatures
Files
-
fdd2a4d80a1e27f0ec8d5fdc0f04ef8f0b46987afd3a4ea4cfab3e7d8c7f0823.exe windows x86
8f8690f744bf0387b56dcf8b63ccec47
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTickCount
SetErrorMode
FileTimeToLocalFileTime
GetFileAttributesA
GetFileTime
HeapFree
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapAlloc
HeapReAlloc
GetCommandLineA
GetProcessHeap
GetStartupInfoA
RtlUnwind
RaiseException
ExitProcess
HeapSize
Sleep
HeapDestroy
HeapCreate
GetConsoleCP
GetConsoleMode
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetACP
IsValidCodePage
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
LCMapStringA
LCMapStringW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoW
SetEnvironmentVariableA
FileTimeToSystemTime
CreateFileA
GetFullPathNameA
GetVolumeInformationA
FindClose
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
WritePrivateProfileStringA
GetOEMCP
GetCPInfo
GlobalFlags
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
FormatMessageA
LocalFree
InterlockedDecrement
GetModuleFileNameW
MulDiv
GetCurrentProcessId
GlobalUnlock
GlobalFree
GetCurrentThread
ConvertDefaultLocale
GetModuleFileNameA
EnumResourceLanguagesA
GetLocaleInfoA
LoadLibraryExA
GlobalLock
lstrcmpA
GlobalAlloc
GetThreadLocale
InterlockedIncrement
FreeResource
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
FreeLibrary
LoadLibraryA
SetLastError
lstrcmpW
GetProcAddress
GetVersionExA
MultiByteToWideChar
CompareStringW
GetVersion
lstrlenA
CompareStringA
InterlockedExchange
WideCharToMultiByte
GetLastError
MapViewOfFile
CreateFileMappingA
FindNextFileA
DeleteFileA
FindFirstFileA
SizeofResource
LockResource
LoadResource
FindResourceA
CreateDirectoryA
GetModuleHandleA
WinExec
CloseHandle
WaitForSingleObject
VirtualFree
CreateProcessA
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
RegisterClipboardFormatA
PostThreadMessageA
SetRect
IsRectEmpty
CopyAcceleratorTableA
LoadCursorA
GetSysColorBrush
DestroyMenu
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
SetWindowContextHelpId
MapDialogRect
GetWindowThreadProcessId
SetCursor
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
GetDesktopWindow
GetActiveWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
PostQuitMessage
CharNextA
IsWindowEnabled
ShowWindow
MoveWindow
SetWindowTextA
UnregisterClassA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
RegisterWindowMessageA
SendDlgItemMessageA
IsChild
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetFocus
IsWindow
SetFocus
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
DispatchMessageA
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
SetForegroundWindow
IsWindowVisible
UpdateWindow
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
MessageBeep
GetNextDlgGroupItem
AdjustWindowRectEx
GetParent
ReleaseCapture
SetCapture
InvalidateRgn
IsDialogMessageA
InvalidateRect
EqualRect
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcA
GetWindowLongA
SetWindowPos
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetWindow
CharUpperA
DrawIcon
LoadIconA
GetClientRect
GetSystemMetrics
SendMessageA
IsIconic
SetWindowLongA
CallWindowProcA
FindWindowA
PostMessageA
MessageBoxA
EnableWindow
WinHelpA
gdi32
ExtSelectClipRgn
PtVisible
DeleteDC
CreateRectRgnIndirect
GetRgnBox
GetMapMode
GetWindowExtEx
GetViewportExtEx
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
DeleteObject
SetMapMode
RestoreDC
SaveDC
GetTextColor
GetBkColor
GetDeviceCaps
GetStockObject
CreateBitmap
GetObjectA
SetBkColor
SetTextColor
GetClipBox
RectVisible
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegQueryValueA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
shell32
SHGetFolderPathA
comctl32
InitCommonControlsEx
shlwapi
PathFindExtensionA
PathStripToRootA
PathFindFileNameA
PathIsUNCA
oledlg
ord8
ole32
CoTaskMemAlloc
OleFlushClipboard
CoTaskMemFree
CLSIDFromString
CLSIDFromProgID
CoRegisterMessageFilter
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
oleaut32
VariantCopy
SysAllocString
SafeArrayDestroy
SystemTimeToVariantTime
VariantTimeToSystemTime
SysAllocStringByteLen
SysStringLen
SysFreeString
OleCreateFontIndirect
SysAllocStringLen
VariantChangeType
VariantClear
VariantInit
wininet
DeleteUrlCacheEntry
FindNextUrlCacheEntryA
FindFirstUrlCacheEntryA
InternetCloseHandle
InternetReadFile
HttpQueryInfoA
InternetOpenUrlA
InternetOpenA
FindCloseUrlCache
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
Sections
.text Size: - Virtual size: 228KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 114KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.JL1410 Size: - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.JL1411 Size: 300KB - Virtual size: 298KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 104KB - Virtual size: 248KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ