Static task
static1
Behavioral task
behavioral1
Sample
fb0ec35ab87a49dd877b1638aa04720c0435ee58b54a85f7ad105765d95b29e8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fb0ec35ab87a49dd877b1638aa04720c0435ee58b54a85f7ad105765d95b29e8.exe
Resource
win10v2004-20220812-en
General
-
Target
fb0ec35ab87a49dd877b1638aa04720c0435ee58b54a85f7ad105765d95b29e8
-
Size
656KB
-
MD5
8bb3e9eed9e8d5d347a86970ddfb5558
-
SHA1
cde3c6c00181dd46bd19da7f1ec48fbddf36e063
-
SHA256
fb0ec35ab87a49dd877b1638aa04720c0435ee58b54a85f7ad105765d95b29e8
-
SHA512
5ca503480f001d09bcb73af8462aa47aaf8bd8210e971a165b6400969842545de53ccef15f770861fdbc7cd763616fa3b7334bb8b77e849e419115155bec66b5
-
SSDEEP
6144:mHQLaP2jIuEYiKs4cv/UiGeb6IXxf3qXcScUIj+uLi3wWs:0QL/oYNmpv+IXB3BScUIjn5
Malware Config
Signatures
Files
-
fb0ec35ab87a49dd877b1638aa04720c0435ee58b54a85f7ad105765d95b29e8.exe windows x86
2d411d1bf6964d091c2f9252c60e782e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
CloseHandle
Process32Next
CreateToolhelp32Snapshot
DeviceIoControl
CreateFileA
GetDriveTypeA
FreeLibrary
WinExec
TerminateProcess
OpenProcess
GetVolumeInformationA
SetErrorMode
SetEnvironmentVariableA
SetEndOfFile
GetSystemDirectoryA
Sleep
FindFirstFileA
FindNextFileA
GetLogicalDrives
FindClose
WideCharToMultiByte
MultiByteToWideChar
RtlUnwind
GetLastError
MoveFileA
RaiseException
IsBadWritePtr
IsBadReadPtr
HeapValidate
GetCommandLineA
GetVersion
ExitProcess
GetCurrentProcess
LCMapStringA
LCMapStringW
DebugBreak
GetStdHandle
WriteFile
InterlockedDecrement
OutputDebugStringA
InterlockedIncrement
GetModuleFileNameA
GetCPInfo
CompareStringA
CompareStringW
GetFileAttributesA
SetFilePointer
FlushFileBuffers
HeapFree
SetUnhandledExceptionFilter
HeapAlloc
HeapReAlloc
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
IsValidLocale
IsValidCodePage
GetLocaleInfoA
EnumSystemLocalesA
GetUserDefaultLCID
GetVersionExA
GetModuleHandleA
GetStringTypeA
GetStringTypeW
SetConsoleCtrlHandler
GetTimeZoneInformation
IsBadCodePtr
SetStdHandle
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
ReadFile
GetACP
GetOEMCP
GetLocaleInfoW
user32
ShowWindow
advapi32
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegOpenKeyA
Sections
.text Size: 488KB - Virtual size: 486KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.1rdata Size: 80KB - Virtual size: 136KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE