Static task
static1
Behavioral task
behavioral1
Sample
fa8deacaa46eebfbf6bb0394d037e6d85051891531854116836db7ed822f7a1e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
fa8deacaa46eebfbf6bb0394d037e6d85051891531854116836db7ed822f7a1e.exe
Resource
win10v2004-20220812-en
General
-
Target
fa8deacaa46eebfbf6bb0394d037e6d85051891531854116836db7ed822f7a1e
-
Size
264KB
-
MD5
549cc7fd0d1d7f1ecce9d1c59123cf91
-
SHA1
608101c491c90a2cf50db4afd342a4424cef91f1
-
SHA256
fa8deacaa46eebfbf6bb0394d037e6d85051891531854116836db7ed822f7a1e
-
SHA512
341b1eca4130b21ec9fe4df56c635b3bbe8da6063f514113b3b1ecf88657739700e8010b6d630803b3cff97d1e14c7a09d173a74e603052d9176b51492308153
-
SSDEEP
6144:zC251eTusuzIlbON0BXuyQFlxe6vyP9BnJwy2UwhCv9:zF1eWYavescnmy2jc
Malware Config
Signatures
Files
-
fa8deacaa46eebfbf6bb0394d037e6d85051891531854116836db7ed822f7a1e.exe windows x86
d0213b8fb43f5b732fc32de2c26d414c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHGetFolderPathAndSubDirW
SHGetSpecialFolderPathW
ShellExecuteExW
SHBrowseForFolderW
CommandLineToArgvW
user32
EnumChildWindows
GetMenuStringA
DestroyAcceleratorTable
SetClassLongA
ModifyMenuW
GetWindowRgn
EndPaint
GetCaretPos
GetWindowRect
RegisterClipboardFormatW
FindWindowW
IsMenu
EqualRect
GetWindowTextLengthA
DispatchMessageA
DdeFreeDataHandle
HideCaret
GetClipboardFormatNameA
ModifyMenuA
SetForegroundWindow
CharNextW
ScrollDC
DialogBoxIndirectParamW
GetKeyNameTextA
SetCursor
DdeUninitialize
RegisterClipboardFormatA
SetMenu
DrawIconEx
GetClassLongW
CloseClipboard
SetWindowLongA
GetAncestor
TrackPopupMenuEx
GetDlgItemTextA
GetSystemMetrics
FrameRect
InsertMenuItemW
ClientToScreen
IsWindowEnabled
GetMenuItemCount
SendNotifyMessageA
ReplyMessage
SetMessageQueue
SetScrollPos
GetClassLongA
IsCharAlphaW
MessageBoxA
LockWindowUpdate
OemToCharA
GetAsyncKeyState
OpenIcon
IntersectRect
TranslateMessage
GetCursor
MapVirtualKeyA
GetDoubleClickTime
AttachThreadInput
InsertMenuItemA
GetDlgItemInt
GetUpdateRgn
SetDlgItemTextW
IsWindow
winspool.drv
EnumPrinterDriversA
EnumPortsA
DeletePrinter
DeletePrinterDriverA
EnumPrintersA
version
GetFileVersionInfoW
VerQueryValueA
GetFileVersionInfoA
shlwapi
StrCmpIW
comctl32
ImageList_GetIcon
ImageList_SetBkColor
ImageList_DragEnter
ImageList_DrawEx
kernel32
GlobalUnlock
GlobalLock
GetDiskFreeSpaceExW
OpenEventW
EnterCriticalSection
FreeEnvironmentStringsW
OpenFileMappingW
SetHandleCount
LoadResource
GlobalFree
GetConsoleOutputCP
SystemTimeToFileTime
GetTimeZoneInformation
GetUserDefaultLCID
SizeofResource
GetTimeFormatA
EnumResourceNamesW
GetQueuedCompletionStatus
WaitForSingleObject
SetFilePointerEx
GlobalReAlloc
IsValidLocale
DeleteCriticalSection
CreateTimerQueue
IsBadReadPtr
FlushFileBuffers
GetComputerNameW
GetSystemDefaultLCID
HeapSize
GetPrivateProfileIntA
SystemTimeToTzSpecificLocalTime
ResetEvent
SetThreadLocale
ConvertDefaultLocale
LCMapStringA
GetStartupInfoA
FindNextFileW
GlobalDeleteAtom
lstrcmpiW
InterlockedDecrement
GetSystemDirectoryW
VirtualQuery
GetStringTypeExW
SetProcessWorkingSetSize
GetPriorityClass
LoadLibraryExA
GetModuleHandleA
lstrcmpiA
GetStringTypeA
VirtualAlloc
OpenEventA
GetFullPathNameW
MultiByteToWideChar
CreateProcessA
GetNumberFormatW
GetCurrentProcessId
TerminateThread
SetEnvironmentVariableW
FindResourceExA
WriteFile
InterlockedExchange
TlsFree
InitializeCriticalSectionAndSpinCount
EnumResourceLanguagesA
GetModuleHandleW
Process32FirstW
WriteConsoleA
GlobalSize
DosDateTimeToFileTime
FindClose
ExitProcess
RemoveDirectoryW
CopyFileA
GetVolumeInformationA
CompareFileTime
UnlockFile
GetLogicalDriveStringsA
MoveFileExW
CreateEventA
EnumSystemLocalesA
GetPrivateProfileStringW
DeviceIoControl
GlobalMemoryStatus
GetConsoleCP
FlushInstructionCache
GetCurrentDirectoryW
InitializeCriticalSection
GetSystemPowerStatus
GetSystemInfo
lstrcpynA
FindNextFileA
GetTickCount
SetStdHandle
SetUnhandledExceptionFilter
EnumCalendarInfoA
SetEvent
VirtualFree
GetLongPathNameW
GetComputerNameA
DeleteFileW
WinExec
GetTempPathW
CreateIoCompletionPort
IsBadWritePtr
ResumeThread
HeapAlloc
SearchPathA
GetWindowsDirectoryW
UnmapViewOfFile
GetLogicalDrives
DuplicateHandle
oleaut32
SafeArrayPutElement
ole32
OleRegEnumVerbs
CreateGenericComposite
WriteClassStm
RegisterDragDrop
OleCreateFromData
OleCreateFromFile
DoDragDrop
GetClassFile
OleFlushClipboard
CoTaskMemFree
PropVariantClear
OleCreateMenuDescriptor
gdi32
PatBlt
SetBitmapBits
CreateFontA
CreateFontIndirectA
GetEnhMetaFilePaletteEntries
SetTextColor
GetCharWidthA
StretchDIBits
SetROP2
OffsetViewportOrgEx
DeleteObject
SelectPalette
advapi32
RegQueryValueW
RegQueryInfoKeyA
MakeAbsoluteSD
SetServiceStatus
OpenThreadToken
SetSecurityDescriptorControl
OpenSCManagerA
GetSecurityDescriptorControl
OpenSCManagerW
CryptAcquireContextW
RegQueryValueExA
CryptGenRandom
RegQueryValueExW
InitializeAcl
RegSetValueExA
GetSecurityInfo
RegDeleteValueA
ConvertStringSecurityDescriptorToSecurityDescriptorW
comdlg32
ChooseColorA
msvcrt
wcspbrk
fclose
tolower
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
malloc
realloc
_expand
_errno
isdigit
_wsplitpath
atol
iswspace
_ismbblead
toupper
strchr
_purecall
floor
_vsnprintf
_strnicmp
wcslen
_c_exit
_strlwr
strstr
wcscmp
free
wcsstr
_mbsrchr
towupper
_wcslwr
_setmbcp
wcstod
calloc
atoi
ctime
_ltow
localtime
qsort
towlower
fread
_snwprintf
srand
_ecvt
time
memmove
strncpy
_stricmp
longjmp
strncmp
wcsspn
wcschr
_wcsupr
sprintf
_wcsdup
_CxxThrowException
_controlfp
Sections
.text Size: 216KB - Virtual size: 215KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 40KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ