Static task
static1
Behavioral task
behavioral1
Sample
fd2270fe4dbf2c32b19a7d600f6d705b2e3b1a9c8bd08b52455e1d3978d3ba6f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fd2270fe4dbf2c32b19a7d600f6d705b2e3b1a9c8bd08b52455e1d3978d3ba6f.exe
Resource
win10v2004-20221111-en
General
-
Target
fd2270fe4dbf2c32b19a7d600f6d705b2e3b1a9c8bd08b52455e1d3978d3ba6f
-
Size
99KB
-
MD5
570cf10c0d94ca959fa4aae6cbc8e41d
-
SHA1
43cf48b994b4f682a6992ad90a390db0bd43cdc3
-
SHA256
fd2270fe4dbf2c32b19a7d600f6d705b2e3b1a9c8bd08b52455e1d3978d3ba6f
-
SHA512
c7e7fcbc21ecc927a5d8711dbd90ea054b99804143476e03458fe8b9217e1bd07c68fe5113846425ded0c12f7246df2e4993827435b8ff73ecff599e925d6248
-
SSDEEP
1536:Q04qIdn2hQ4SE3ZewJCIdOKikgMtVWgyhEzF3/O84EJhdY56eU97:vo2adE3c4TOKiktpyqxNjJhdYI
Malware Config
Signatures
Files
-
fd2270fe4dbf2c32b19a7d600f6d705b2e3b1a9c8bd08b52455e1d3978d3ba6f.exe windows x86
3c4588c67eea78691a8a5aaf2ecfb9b8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
IsChild
GetForegroundWindow
ShowWindow
GetSysColorBrush
GetScrollInfo
DrawTextA
HideCaret
SetWindowLongA
GetMessagePos
GetDesktopWindow
GetScrollRange
GetMenu
GetSubMenu
IsMenu
GetClassLongA
GetParent
CharLowerBuffA
GetDCEx
GetActiveWindow
SystemParametersInfoA
GetMenuItemID
CharLowerA
GetMenuItemInfoA
CreateIcon
CreateWindowExA
DrawIcon
FrameRect
IsDialogMessageA
GetPropA
EnumThreadWindows
CreatePopupMenu
GetMenuItemCount
DispatchMessageA
EnableScrollBar
GetFocus
CallWindowProcA
SetWindowPos
IsWindowVisible
EnableWindow
DefMDIChildProcA
GetWindow
IsWindowEnabled
SetWindowTextA
GetSysColor
DrawIconEx
DrawFrameControl
GetWindowTextA
MessageBoxA
EndDeferWindowPos
GetClassInfoA
GetDC
GetScrollPos
GetClipboardData
GetLastActivePopup
SetTimer
RegisterClassA
EndPaint
SetCursor
GetCursorPos
TrackPopupMenu
CheckMenuItem
DrawMenuBar
GetMenuStringA
ShowScrollBar
EnableMenuItem
GetIconInfo
GetDlgItem
CreateMenu
FindWindowA
kernel32
SetFilePointer
MoveFileExA
VirtualQuery
LockResource
GetLocaleInfoA
FormatMessageA
FindClose
lstrcpynA
WriteFile
GetCurrentThreadId
DeleteCriticalSection
GetCommandLineA
lstrlenA
GetUserDefaultLCID
GetFileSize
GetVersion
lstrcmpA
Sleep
EnterCriticalSection
GetStdHandle
SetThreadLocale
lstrcmpiA
GetCurrentProcessId
LoadLibraryExA
GetFileAttributesA
GetACP
SetLastError
GetLastError
GetVersionExA
GetCurrentThread
GetSystemDefaultLangID
ReadFile
GetModuleHandleA
GetFullPathNameA
GetTickCount
GlobalAlloc
CreateEventA
VirtualAlloc
GetProcAddress
VirtualAllocEx
HeapFree
SetEndOfFile
WaitForSingleObject
FreeResource
GlobalDeleteAtom
GetStringTypeA
HeapDestroy
EnumCalendarInfoA
LoadLibraryA
GetDiskFreeSpaceA
CreateFileA
GetOEMCP
GetModuleFileNameA
GetLocalTime
InitializeCriticalSection
GetCPInfo
CreateThread
GetEnvironmentStrings
GlobalFindAtomA
ExitProcess
ExitThread
ResetEvent
SetEvent
LoadResource
SetErrorMode
CompareStringA
msvcrt
log
calloc
memcpy
shell32
SHFileOperationA
Sections
.text Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.init Size: 51KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 842B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ