Static task
static1
Behavioral task
behavioral1
Sample
fad3f5704499df246f1aaed008f2e6e8384f55adf38b91d45de02e674c2cbf24.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
fad3f5704499df246f1aaed008f2e6e8384f55adf38b91d45de02e674c2cbf24.exe
Resource
win10v2004-20221111-en
General
-
Target
fad3f5704499df246f1aaed008f2e6e8384f55adf38b91d45de02e674c2cbf24
-
Size
153KB
-
MD5
fed6444f8c89cb4f39a2cababea957fc
-
SHA1
3f5c610d4a37282c091af4a515b7374f7cfecf3f
-
SHA256
fad3f5704499df246f1aaed008f2e6e8384f55adf38b91d45de02e674c2cbf24
-
SHA512
cbeda9f47bd886f9019fa009393a09ac921a073dd873d38d681cb3f6e3bb6dac33254998fdb23817d357b60d77c2bd67105046346a0e1fe876d9c91f521323fb
-
SSDEEP
3072:bWzAc7l9lmNrPWVXzhWnQ/UsUv9rZruzxFyyZZQe9NWxxDZTQlz7BaU:qrl9wNCXzhpX24uyQqF7E
Malware Config
Signatures
Files
-
fad3f5704499df246f1aaed008f2e6e8384f55adf38b91d45de02e674c2cbf24.exe windows x86
1667f21f376de5328a72e7d80f873473
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CompareFileTime
CopyFileA
CreateEventW
CreateFileA
CreateFileMappingA
CreateProcessA
DeleteFileA
DeviceIoControl
EnterCriticalSection
ExitThread
FileTimeToDosDateTime
FindFirstFileW
FindNextFileA
FindResourceA
FormatMessageA
FreeEnvironmentStringsW
FreeLibrary
GetACP
GetConsoleOutputCP
GetCurrentDirectoryA
GetCurrentProcess
GetDateFormatA
GetDiskFreeSpaceA
GetEnvironmentStrings
GetExitCodeThread
GetFileSize
GetFileType
GetLocalTime
GetLocaleInfoA
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetPrivateProfileStringA
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetSystemDefaultLCID
GetSystemDirectoryA
GetSystemDirectoryW
GetTempFileNameA
GetThreadLocale
GetTickCount
GetTimeZoneInformation
GetVersion
GetVersionExW
GlobalAlloc
GlobalDeleteAtom
GlobalLock
GlobalReAlloc
HeapCreate
HeapDestroy
HeapFree
InterlockedCompareExchange
InterlockedExchange
LCMapStringA
LCMapStringW
LoadLibraryA
LoadLibraryExA
LoadLibraryExW
LoadResource
LocalFree
OutputDebugStringA
RaiseException
ReleaseMutex
SetFileAttributesW
SetFilePointer
SetHandleCount
SetUnhandledExceptionFilter
TerminateThread
TlsFree
TlsGetValue
UnhandledExceptionFilter
UnmapViewOfFile
VirtualAlloc
VirtualProtect
VirtualQuery
WaitForSingleObject
WriteFile
lstrcmpiW
lstrcpyA
user32
CallNextHookEx
CallWindowProcA
CharLowerA
CloseClipboard
DeleteMenu
DestroyWindow
DispatchMessageA
DrawEdge
DrawFrameControl
EmptyClipboard
EnableMenuItem
FrameRect
GetActiveWindow
GetDC
GetDCEx
GetFocus
GetIconInfo
GetMessageA
GetParent
GetScrollRange
GetSysColorBrush
GetSystemMetrics
GetTopWindow
GetWindowDC
GetWindowRect
InsertMenuA
InvalidateRect
IsDialogMessageA
IsWindowEnabled
LoadBitmapA
OemToCharA
OpenClipboard
PtInRect
RedrawWindow
RegisterClassA
RegisterClipboardFormatA
RegisterWindowMessageA
ReleaseDC
RemoveMenu
ScreenToClient
SetForegroundWindow
SetMenu
SetPropA
SetScrollInfo
SetTimer
SetWindowPlacement
SetWindowPos
SetWindowsHookExA
ShowCursor
TrackPopupMenu
UnhookWindowsHookEx
WaitMessage
wsprintfA
Sections
.text Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 86KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 22KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ