Static task
static1
Behavioral task
behavioral1
Sample
fb74c45a24697dd3366ef8450cb26d6cfd15eb729e47d5b72426b14bf0398932.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fb74c45a24697dd3366ef8450cb26d6cfd15eb729e47d5b72426b14bf0398932.exe
Resource
win10v2004-20220812-en
General
-
Target
fb74c45a24697dd3366ef8450cb26d6cfd15eb729e47d5b72426b14bf0398932
-
Size
135KB
-
MD5
a0e02f83fc50609e8ddb31e09d268999
-
SHA1
e54933d25b5bf034e2e94de580ae5dd3daea54b1
-
SHA256
fb74c45a24697dd3366ef8450cb26d6cfd15eb729e47d5b72426b14bf0398932
-
SHA512
c80bc904f8eb85946d65bd524aadde91903ba21d0d0e34458101634888f327271b76ec4f96583023c0606fa3f0eea927ae3826f8d7fc7f127d60aa22406791e2
-
SSDEEP
3072:UCRpo9b8FZHBxRNW+a7NGhH8bLYBSd7trgY:UCpF58+iGR8bLXl
Malware Config
Signatures
Files
-
fb74c45a24697dd3366ef8450cb26d6cfd15eb729e47d5b72426b14bf0398932.exe windows x86
b961f614b6e96eef953a884c8918233c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SearchPathA
GetShortPathNameA
DeleteFileA
GetModuleFileNameA
GetSystemDirectoryW
GetShortPathNameW
SystemTimeToFileTime
GetSystemTime
ExitProcess
GetSystemInfo
GetVersionExW
Sleep
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
GetCurrentThreadId
SetEndOfFile
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
ReadFile
HeapSize
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
CreateFileA
FlushFileBuffers
SetStdHandle
GetConsoleMode
GetConsoleCP
WideCharToMultiByte
SetFilePointer
InitializeCriticalSection
GetSystemTimeAsFileTime
GetCurrentProcessId
GetModuleHandleW
GetModuleFileNameW
GetModuleHandleA
GetTickCount
CreateFileW
WriteFile
GetProcAddress
CloseHandle
LoadResource
LockResource
SizeofResource
LoadLibraryA
WinExec
LoadLibraryExW
FindResourceA
QueryPerformanceCounter
GetCommandLineW
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
MultiByteToWideChar
FreeEnvironmentStringsA
RaiseException
IsValidCodePage
GetOEMCP
HeapAlloc
RtlUnwind
ExitThread
GetLastError
ResumeThread
CreateThread
HeapFree
GetVersionExA
GetProcessHeap
GetStartupInfoW
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualFree
VirtualAlloc
HeapReAlloc
HeapDestroy
HeapCreate
GetStdHandle
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
SetHandleCount
GetFileType
GetStartupInfoA
GetCPInfo
GetACP
user32
CreateWindowExW
GetDesktopWindow
ShowWindow
UpdateWindow
SetTimer
GetWindowRect
DrawTextW
GetThreadDesktop
CreateDesktopW
SetThreadDesktop
SwitchDesktop
CloseDesktop
GetWindowTextW
MessageBoxW
GetWindowLongW
GetClientRect
RedrawWindow
CreateWindowExA
GetSystemMetrics
LoadCursorW
RegisterClassExW
GetMessageW
TranslateMessage
DispatchMessageW
UnregisterClassW
DefWindowProcW
KillTimer
BeginPaint
EndPaint
PostQuitMessage
RegisterHotKey
gdi32
CreateFontW
SetBkMode
SetTextColor
CreatePen
SelectObject
CreateSolidBrush
Rectangle
DeleteObject
SetDIBitsToDevice
advapi32
RegQueryValueExW
RegOpenKeyExW
RegSetValueExW
RegCloseKey
RegCreateKeyExW
rpcrt4
UuidCreate
UuidToStringW
RpcStringFreeW
wininet
InternetReadFile
HttpOpenRequestW
InternetConnectW
InternetOpenW
InternetCrackUrlW
InternetCloseHandle
HttpSendRequestW
Sections
.text Size: 112KB - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ