Static task
static1
Behavioral task
behavioral1
Sample
fbe49c862970c0fa91548c4a309795825d97b3a561b1210e7e75312e9375a935.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
fbe49c862970c0fa91548c4a309795825d97b3a561b1210e7e75312e9375a935.exe
Resource
win10v2004-20220812-en
General
-
Target
fbe49c862970c0fa91548c4a309795825d97b3a561b1210e7e75312e9375a935
-
Size
73KB
-
MD5
20b27ae0032839aca3c513b0f5f69dbc
-
SHA1
25fa35e65750d87cbfee16ac5141640de9291e79
-
SHA256
fbe49c862970c0fa91548c4a309795825d97b3a561b1210e7e75312e9375a935
-
SHA512
e6b126c7f5eb9e86efdcbc10bbc7f37d815618b9c64d230bb3cdde9c91cfa13908c64a607fcb787e33f5c75f406d192d0acb6a01a00f800f2d1628389d4929bd
-
SSDEEP
768:VoSHDDYFeOm9KmJwfYkQyZQdokAHg5NxePQWT1Ui1mh3+wTLiLWpG3fsa+uu2nFN:NLnQY9ySoU5NkPPkdTLfpC1y9ZojXt
Malware Config
Signatures
Files
-
fbe49c862970c0fa91548c4a309795825d97b3a561b1210e7e75312e9375a935.exe windows x86
0ca62582dae384d1279b4c22952cb063
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TerminateProcess
FreeLibrary
GetProcAddress
LoadLibraryA
IsBadWritePtr
GetSystemDirectoryA
MultiByteToWideChar
lstrlenW
GetCurrentProcessId
DeleteFileA
SetFileAttributesA
GetFileAttributesA
CreateMutexA
ExitProcess
Sleep
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
CreateProcessA
lstrcatA
GetTempPathA
GlobalFree
GlobalAlloc
lstrcpyA
OpenFileMappingA
OpenMutexA
GetLocalTime
GetModuleFileNameA
CopyFileA
GetVersionExA
SetProcessPriorityBoost
SetThreadPriority
GetCurrentThread
SetPriorityClass
GetEnvironmentVariableA
GetShortPathNameA
GetTickCount
GetModuleHandleA
HeapFree
HeapAlloc
GetCommandLineA
GetCommandLineW
FreeResource
GetCurrentProcess
LoadResource
SizeofResource
FindResourceA
LoadLibraryExA
FindClose
FindNextFileA
FindFirstFileA
GetVolumeInformationA
GetCurrentDirectoryA
CreateToolhelp32Snapshot
Process32First
Process32Next
RaiseException
FlushFileBuffers
SetStdHandle
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
GetStringTypeW
GetStringTypeA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
HeapCreate
HeapDestroy
VirtualAlloc
HeapSize
VirtualFree
LCMapStringW
LCMapStringA
GetOEMCP
GetACP
GetCPInfo
GetVersion
GetStartupInfoA
RtlUnwind
HeapReAlloc
FileTimeToSystemTime
lstrcpynA
GetLastError
LocalFree
GetFileSize
SetFilePointer
ReadFile
CreateFileA
WriteFile
CloseHandle
WideCharToMultiByte
LockResource
lstrlenA
user32
EnumChildWindows
wsprintfA
DefWindowProcA
DispatchMessageA
TranslateMessage
PostMessageA
KillTimer
PostQuitMessage
CreateWindowExA
SetTimer
ShowWindow
UpdateWindow
LoadIconA
LoadCursorA
RegisterClassExA
GetDesktopWindow
GetMessageA
advapi32
RegCreateKeyExA
RegSetValueExA
RegCloseKey
shell32
SHGetSpecialFolderPathA
SHChangeNotify
CommandLineToArgvW
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ShellExecuteExA
ole32
CoCreateInstance
OleRun
CoTaskMemFree
CoInitialize
CoUninitialize
oleaut32
VariantClear
wininet
FindNextUrlCacheEntryA
DeleteUrlCacheEntry
FindFirstUrlCacheEntryA
psapi
GetModuleFileNameExA
netapi32
Netbios
Sections
.text Size: 50KB - Virtual size: 49KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 928B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ