Static task
static1
Behavioral task
behavioral1
Sample
fd9454a0fab920914373aaf67c5e182dc5641e9a90671b34f4f0d90c61c80438.exe
Resource
win7-20220812-en
General
-
Target
fd9454a0fab920914373aaf67c5e182dc5641e9a90671b34f4f0d90c61c80438
-
Size
149KB
-
MD5
d6b2701464da68a958bc9be83c09d1c0
-
SHA1
fab9fc22f36ce0d012f8ab6a300384d5c6de67a8
-
SHA256
fd9454a0fab920914373aaf67c5e182dc5641e9a90671b34f4f0d90c61c80438
-
SHA512
25f67ad7c1e637990c758ffd767b4115adb9b5c9912be5f30bccc20fa911e0024315e4cc4afd775dde0401f182c827183b53f26e3733fcdb076be8cd15869f0d
-
SSDEEP
3072:FCFaxACdEAQ9MpPIF85Ur7lLZPCyt65ojFPvcxisaiFkRvOYnlZ:9WAKMxj5Ur7l9l650FP0xis
Malware Config
Signatures
Files
-
fd9454a0fab920914373aaf67c5e182dc5641e9a90671b34f4f0d90c61c80438.exe windows x86
cb2f54bd6f3c4b2e1669e2bd24537e1c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineA
GetCommandLineW
GetCurrentThread
GetLastError
GetModuleHandleA
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetVersion
HeapAlloc
HeapFree
InterlockedExchange
FreeLibrary
LocalAlloc
LocalFree
MultiByteToWideChar
RaiseException
SetCurrentDirectoryA
SetErrorMode
SetThreadPriority
lstrcatA
lstrcpyA
lstrlenA
lstrlenW
VirtualAlloc
FormatMessageA
ExitProcess
CreateMutexA
CompareStringA
LoadLibraryA
CloseHandle
user32
IsIconic
IsWindowVisible
MessageBoxA
SendMessageTimeoutA
SetForegroundWindow
ShowWindow
LoadIconA
LoadCursorA
LoadCursorW
LoadIconW
GetWindow
GetParent
GetDesktopWindow
GetClassNameA
FindWindowA
GetWindowThreadProcessId
gdi32
GetStockObject
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
Sections
.text Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 110KB - Virtual size: 109KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ