Static task
static1
Behavioral task
behavioral1
Sample
fcff008f4d1de611065182a14dae7e613abc7d13ca6a0f62693a77b1e5220bb2.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
fcff008f4d1de611065182a14dae7e613abc7d13ca6a0f62693a77b1e5220bb2.exe
Resource
win10v2004-20221111-en
General
-
Target
fcff008f4d1de611065182a14dae7e613abc7d13ca6a0f62693a77b1e5220bb2
-
Size
150KB
-
MD5
ae249e7dc801432400ab0dc2702b30b2
-
SHA1
d499bcec1c2e858cce372c8acc67052458372d30
-
SHA256
fcff008f4d1de611065182a14dae7e613abc7d13ca6a0f62693a77b1e5220bb2
-
SHA512
ca837526417b6ca22f2131b48236689d676cc07b865445c7536c8f2f05806b4fe2a495630f5b152765430775689a2097297d100f76b4c8595d9301d96c0a1c0d
-
SSDEEP
3072:QCL9AmHO95ZhW8YVEHp7zMOWg3ax6acScXjNJk9t4sv5dasQT:DAxjgOecSMjvQxdas
Malware Config
Signatures
Files
-
fcff008f4d1de611065182a14dae7e613abc7d13ca6a0f62693a77b1e5220bb2.exe windows x86
24b5095a4de0c72b4f1396b4af9c8087
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
MulDiv
SetHandleCount
LocalFileTimeToFileTime
GetModuleFileNameW
GetTempPathA
WaitForMultipleObjects
VirtualProtect
GetUserDefaultLCID
GetStartupInfoA
WideCharToMultiByte
GetUserDefaultLangID
GetModuleHandleA
user32
LoadStringA
SetFocus
PeekMessageA
WaitMessage
RegisterClipboardFormatA
SetScrollPos
GetSysColor
TrackPopupMenu
msvcrt
log10
__p___initenv
_initterm
fwrite
exit
_getch
_wfopen
_adjust_fdiv
_filbuf
__getmainargs
__p__fmode
_iob
__setusermatherr
_acmdln
sqrt
__p__commode
__set_app_type
_except_handler3
fgetpos
_XcptFilter
oleaut32
SysFreeString
GetActiveObject
SafeArrayPtrOfIndex
SysStringLen
SysAllocStringByteLen
VariantCopyInd
SysAllocStringLen
advapi32
SetSecurityDescriptorOwner
LookupPrivilegeValueW
CryptCreateHash
CheckTokenMembership
RegEnumValueA
GetSecurityDescriptorDacl
RegDeleteKeyA
OpenSCManagerW
DeleteService
RegOpenKeyExA
ole32
CoRevokeClassObject
DoDragDrop
CoGetInterfaceAndReleaseStream
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CoInitializeSecurity
ProgIDFromCLSID
CoTaskMemAlloc
OleFlushClipboard
comctl32
ImageList_DragEnter
ImageList_GetBkColor
ImageList_ReplaceIcon
ImageList_LoadImageA
ImageList_Draw
shell32
SHBrowseForFolderW
SHCreateDirectoryExA
DragQueryFileW
DragQueryFileA
ShellExecuteExW
SHGetDesktopFolder
SHCreateDirectoryExW
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 137KB - Virtual size: 137KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE