Static task
static1
Behavioral task
behavioral1
Sample
fbff8fa9386f6e565cf6fcb11367e4f71b10e377e0eddb66a24ea59fce0358e3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
fbff8fa9386f6e565cf6fcb11367e4f71b10e377e0eddb66a24ea59fce0358e3.exe
Resource
win10v2004-20220812-en
General
-
Target
fbff8fa9386f6e565cf6fcb11367e4f71b10e377e0eddb66a24ea59fce0358e3
-
Size
272KB
-
MD5
98a73a9c0359e4f0a8d842b21e242154
-
SHA1
e5fe206ced438a1138ccab73c4bb3409091ca29b
-
SHA256
fbff8fa9386f6e565cf6fcb11367e4f71b10e377e0eddb66a24ea59fce0358e3
-
SHA512
d6e40d6a245c9a8e990b387fbf88e31e6c6cafd5e95e05875df3ac23cde3f1735de697525cbdf93d517ce8a7257578c00ecd39b56191e20c394c99937cc534ba
-
SSDEEP
3072:pRsHxivXQANaoyyG4W7XVfn2Rnk0EkIFvDoZY0w4hGNc9uWCUjSb9O:pfAuyy82OHFho2NKc
Malware Config
Signatures
Files
-
fbff8fa9386f6e565cf6fcb11367e4f71b10e377e0eddb66a24ea59fce0358e3.exe windows x86
3c9617f799de325f67d90e838b74d72f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
LoadLibraryW
GetProcAddress
DeleteCriticalSection
lstrcpynA
LeaveCriticalSection
EnterCriticalSection
lstrcmpiA
lstrlenA
lstrcmpA
LoadLibraryA
GetModuleHandleA
SearchPathA
GetBinaryTypeW
GetDiskFreeSpaceExW
GetDllDirectoryA
InterlockedIncrement
BeginUpdateResourceW
MapUserPhysicalPages
UnmapViewOfFile
SetFileShortNameW
FatalAppExitW
GetProcessAffinityMask
GetConsoleProcessList
GlobalSize
GetFirmwareEnvironmentVariableA
GetTempPathW
_lclose
WriteConsoleOutputW
TransmitCommChar
WaitForDebugEvent
FillConsoleOutputAttribute
IsSystemResumeAutomatic
SetComputerNameW
WriteProfileStringW
BindIoCompletionCallback
SetCommState
EnumSystemLanguageGroupsW
SetDllDirectoryW
SetMailslotInfo
GetCommMask
GlobalGetAtomNameW
GetCurrentProcess
RequestWakeupLatency
SetThreadExecutionState
lstrcatW
SetFirmwareEnvironmentVariableW
SystemTimeToFileTime
IsBadWritePtr
EnumDateFormatsW
IsValidLanguageGroup
AssignProcessToJobObject
GetStringTypeW
GetNamedPipeInfo
GetLogicalDrives
CreateConsoleScreenBuffer
ConvertThreadToFiber
QueryMemoryResourceNotification
SetProcessPriorityBoost
WriteConsoleW
HeapUnlock
GlobalFix
FindNextFileW
VirtualQueryEx
CreateMemoryResourceNotification
MoveFileExW
LocalFree
QueueUserAPC
UnhandledExceptionFilter
CreateJobSet
QueueUserWorkItem
HeapCompact
DeleteTimerQueue
IsBadHugeWritePtr
SetNamedPipeHandleState
GetFileSizeEx
GetThreadLocale
SetConsoleMode
GlobalMemoryStatusEx
CreateJobObjectA
GetComputerNameExA
CreateFileMappingW
ReadConsoleOutputW
CreateWaitableTimerW
WriteProfileStringA
GetConsoleCP
EnumResourceTypesW
WaitCommEvent
PeekConsoleInputW
GetNumaHighestNodeNumber
GetVersion
DebugActiveProcess
EnumResourceTypesA
CreateNamedPipeA
CreateProcessW
InitializeCriticalSectionAndSpinCount
EnumDateFormatsA
VirtualAllocEx
_hwrite
IsValidLocale
SetFileApisToOEM
SetThreadAffinityMask
GetConsoleAliasExesW
FindFirstFileExA
FillConsoleOutputCharacterA
RemoveVectoredExceptionHandler
SetConsoleScreenBufferSize
EnumSystemCodePagesW
EnumLanguageGroupLocalesW
EnumResourceNamesW
CreateDirectoryExA
WaitForMultipleObjectsEx
GlobalCompact
CopyFileExW
FlushInstructionCache
SetCommMask
ResetWriteWatch
GetCurrentDirectoryA
GlobalFindAtomW
GetSystemWindowsDirectoryW
GetCurrencyFormatA
SetFileValidData
RtlCaptureContext
FreeEnvironmentStringsA
DecodeSystemPointer
GetEnvironmentVariableA
CreateThread
FindActCtxSectionGuid
SetConsoleOutputCP
SetWaitableTimer
GetVersionExW
SetConsoleDisplayMode
FlushFileBuffers
GetModuleHandleExW
SetTimeZoneInformation
InitAtomTable
GetDriveTypeW
SetSystemTimeAdjustment
AddConsoleAliasA
WaitForMultipleObjects
AddRefActCtx
OpenMutexA
CreateMutexA
LCMapStringA
FindResourceExW
GlobalReAlloc
GetVolumeInformationA
WritePrivateProfileStructW
SetTapePosition
ReplaceFileW
AddAtomA
ChangeTimerQueueTimer
CreateFiber
FindCloseChangeNotification
GlobalAddAtomW
RtlCaptureStackBackTrace
GetEnvironmentVariableW
FindNextFileA
GetLongPathNameA
OpenJobObjectA
DeleteAtom
OutputDebugStringA
WriteConsoleOutputCharacterA
QueryPerformanceCounter
GetWindowsDirectoryA
OpenEventA
GetUserDefaultUILanguage
SetThreadPriorityBoost
GetProcessHeaps
EnumCalendarInfoExW
lstrcpynW
GetCurrencyFormatW
FindActCtxSectionStringW
HeapLock
GetSystemDefaultLCID
ReplaceFileA
EnumSystemCodePagesA
GetNamedPipeHandleStateA
CreateActCtxA
WritePrivateProfileStringW
GetProcessVersion
GetPrivateProfileSectionA
GetNativeSystemInfo
GetNumberFormatA
FindClose
GetProcessIoCounters
QueryPerformanceFrequency
SetCalendarInfoW
EndUpdateResourceW
CommConfigDialogW
CallNamedPipeA
ReadConsoleOutputCharacterW
SetFilePointer
WaitNamedPipeW
GlobalUnWire
GetShortPathNameW
ConnectNamedPipe
AddAtomW
InterlockedExchange
HeapFree
VirtualAlloc
UpdateResourceA
FindFirstVolumeW
FindAtomA
_lread
GetConsoleMode
GetTickCount
SetCurrentDirectoryA
LoadModule
SetCriticalSectionSpinCount
SizeofResource
SetSystemPowerState
GetCalendarInfoA
FindFirstFileW
SetEndOfFile
GetConsoleAliasA
EnumSystemLocalesW
UpdateResourceW
SwitchToFiber
WritePrivateProfileStructA
FreeConsole
LCMapStringW
GetCommTimeouts
GetBinaryTypeA
WritePrivateProfileSectionA
DefineDosDeviceA
GetDevicePowerState
CreateSemaphoreA
MapViewOfFile
GetTapePosition
CreateMailslotW
GetFileAttributesExA
GetPriorityClass
GetNumaNodeProcessorMask
SearchPathW
GetProfileSectionA
CancelDeviceWakeupRequest
ConvertDefaultLocale
GetUserGeoID
IsDebuggerPresent
CreateMutexW
lstrcatA
FlushViewOfFile
LocalShrink
CreateTimerQueueTimer
GetConsoleScreenBufferInfo
InitializeCriticalSection
WriteConsoleOutputCharacterW
GetFullPathNameW
SetConsoleCursorInfo
OpenSemaphoreA
FindVolumeMountPointClose
GetLocalTime
GetFileInformationByHandle
DeleteFiber
DnsHostnameToComputerNameW
VirtualUnlock
GetSystemTimeAdjustment
FindFirstVolumeMountPointW
CommConfigDialogA
GetProfileIntA
FlushConsoleInputBuffer
SetVolumeLabelW
SetThreadContext
OpenJobObjectW
GetFileAttributesW
PeekConsoleInputA
HeapDestroy
DecodePointer
WriteProcessMemory
OpenEventW
SuspendThread
CompareStringA
GetModuleHandleW
GetStringTypeA
GetProcessHeap
GetConsoleOutputCP
WriteConsoleA
GetLocaleInfoA
HeapSize
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
CreateFileA
SetStdHandle
GetSystemTimeAsFileTime
GetCurrentProcessId
InterlockedDecrement
GetCurrentThreadId
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
RtlUnwind
GetFileType
SetHandleCount
ReadFile
MultiByteToWideChar
CloseHandle
GetModuleFileNameA
GetStdHandle
WriteFile
Sleep
HeapReAlloc
VirtualFree
HeapCreate
SetUnhandledExceptionFilter
TerminateProcess
GetStartupInfoA
GetCommandLineA
HeapAlloc
GetLastError
comsvcs
MTSCreateActivity
SafeRef
msi
ord60
ord6
ord168
ord249
ord261
ord126
ord203
ord175
ord68
ord190
ord177
ord264
ord181
ord110
ord247
ord176
ord240
ord210
ord95
ord156
ord192
ord262
ord88
ord208
ord65
ord219
ord15
ord113
ord89
ord174
ord55
ord94
ord56
ord131
ord252
ord7
ord37
ord228
ord85
ord266
ord66
ord178
ord212
ord246
ord81
ord232
ord45
ord101
ord154
ord40
ord72
ord241
ord38
ord225
ord273
ord173
ord223
ord179
ord82
ord189
ord230
ord250
ord39
ord109
ord194
ord224
ord213
ord269
ord67
ord11
ord193
ord14
ord231
ord129
ord258
msimg32
TransparentBlt
AlphaBlend
Sections
.text Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 193KB - Virtual size: 200KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ