Static task
static1
Behavioral task
behavioral1
Sample
dfa4bee6623a6611b958e9bdc3ba33413109401b5b15dae40b65d8ca7b233b19.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dfa4bee6623a6611b958e9bdc3ba33413109401b5b15dae40b65d8ca7b233b19.exe
Resource
win10v2004-20220901-en
General
-
Target
dfa4bee6623a6611b958e9bdc3ba33413109401b5b15dae40b65d8ca7b233b19
-
Size
278KB
-
MD5
05bd356bf8f7a75feb9589c3fc867a50
-
SHA1
d01dcec92e78ac20aca12999c7a795cc43b37f82
-
SHA256
dfa4bee6623a6611b958e9bdc3ba33413109401b5b15dae40b65d8ca7b233b19
-
SHA512
a8432a5c03621202691428bbb055c4db46b35a5b1ded1eaeaa11460432086d164768e1ee5dfee87e4279d359c6f03b73ef65848f15daa4c5234f83d2be1fbd29
-
SSDEEP
3072:iCudkteVPVJLIKgRV1/taZmp/7RBCPlMiPCI30vAg0FuXics/Fgj1ZZrualnRkxP:YdkteVPVJCVNcop/PRM0vAONtj1ZQjx
Malware Config
Signatures
Files
-
dfa4bee6623a6611b958e9bdc3ba33413109401b5b15dae40b65d8ca7b233b19.exe windows x86
b5ad50121e57cace1c23fef866f0bdbb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
GetProcAddress
GetModuleHandleA
lstrlenA
lstrcmpiA
SetEvent
CloseHandle
CreateThread
CreateEventA
InterlockedIncrement
GetModuleFileNameA
GetModuleHandleW
IsDBCSLeadByte
FreeLibrary
DeleteCriticalSection
LoadResource
FindResourceA
LoadLibraryExA
Sleep
GetCurrentThreadId
GetCommandLineA
FlushFileBuffers
CreateFileA
ReadFile
WriteConsoleW
InitializeCriticalSection
RaiseException
lstrlenW
WideCharToMultiByte
MultiByteToWideChar
InterlockedDecrement
GetVersionExA
CreateMutexA
WaitForSingleObject
SizeofResource
ReleaseMutex
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
LoadLibraryA
InitializeCriticalSectionAndSpinCount
GetConsoleMode
GetConsoleCP
SetFilePointer
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
EnterCriticalSection
LeaveCriticalSection
HeapFree
GetProcessHeap
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
HeapAlloc
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetStartupInfoA
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
LCMapStringA
LCMapStringW
HeapCreate
VirtualFree
HeapReAlloc
ExitProcess
WriteFile
GetStdHandle
HeapSize
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
user32
CharNextW
CharNextA
PostThreadMessageA
DispatchMessageA
GetMessageA
wsprintfA
advapi32
RegSetValueExA
RegCreateKeyExA
RegDeleteValueA
RegDeleteKeyA
RegEnumKeyExA
RegOpenKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegQueryInfoKeyA
ole32
CoRegisterClassObject
CoTaskMemRealloc
CoTaskMemAlloc
CoCreateInstance
CoTaskMemFree
StringFromGUID2
CoUninitialize
CoInitialize
CoRevokeClassObject
oleaut32
VarUI4FromStr
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
SysAllocString
SysStringLen
SysStringByteLen
SysAllocStringByteLen
SysFreeString
VariantClear
Sections
.text Size: 150KB - Virtual size: 150KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 67KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ftqjwzx Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE