Static task
static1
Behavioral task
behavioral1
Sample
f90edb7b9e2f86973fe3055b4bbd3548ad727044d65856ef244bac7ecfa8c065.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f90edb7b9e2f86973fe3055b4bbd3548ad727044d65856ef244bac7ecfa8c065.exe
Resource
win10v2004-20220901-en
General
-
Target
f90edb7b9e2f86973fe3055b4bbd3548ad727044d65856ef244bac7ecfa8c065
-
Size
250KB
-
MD5
fffbc8d3a052123f09253f417bbc3f0d
-
SHA1
9636cc947c151234b98b90bfebbddad5d7a20098
-
SHA256
f90edb7b9e2f86973fe3055b4bbd3548ad727044d65856ef244bac7ecfa8c065
-
SHA512
7f4ce6b1beb5b77cf265ec1b4acf2ad0e1de6ad287660042e7cbbed5306132c475492065e2b118c0f2427f4e2a23b9d12204831721cbd5187219d856578f3e73
-
SSDEEP
6144:Cq6SQWzKUSaIFqdO9XYqXvnKSFKhoVmTVLf31Sp:sSQs/SjFxNYyVTVm11S
Malware Config
Signatures
Files
-
f90edb7b9e2f86973fe3055b4bbd3548ad727044d65856ef244bac7ecfa8c065.exe windows x86
4917038eb628638b5fe31e57d75903d9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
StrRetToStrW
kernel32
GetModuleFileNameW
GetLastError
CreateEventW
GetThreadPriority
GetWindowsDirectoryW
GetVolumeInformationW
ExpandEnvironmentStringsW
GetFileAttributesW
GetSystemDirectoryW
GetVersionExW
Sleep
GetTempFileNameW
GetProcessHeap
IsDebuggerPresent
GetCurrentProcessId
GetCurrentThreadId
InitializeCriticalSection
GetCurrentThread
GetTickCount
GetLogicalDrives
SetEvent
WaitForSingleObject
CreateDirectoryW
SetErrorMode
SetUnhandledExceptionFilter
GetCurrentProcess
QueryPerformanceCounter
CreateMutexW
GetProcAddress
GetModuleHandleA
advapi32
RegEnumValueW
GetUserNameW
RegEnumKeyExW
RegCloseKey
RegOpenKeyExW
StartServiceW
RegOpenKeyW
RegQueryValueExW
OpenServiceW
OpenSCManagerW
CloseServiceHandle
RegFlushKey
shell32
SHGetDesktopFolder
SHGetFolderPathW
ole32
CoInitialize
CoUninitialize
cfgmgr32
CM_Free_Log_Conf
CM_Next_Range
user32
CharPrevA
LoadImageW
OpenClipboard
MessageBoxIndirectA
IsMenu
SendDlgItemMessageA
CharPrevW
ShowCursor
wsprintfA
RegisterWindowMessageW
GetKeyboardLayout
EnumClipboardFormats
GetDesktopWindow
CreateAcceleratorTableW
PeekMessageW
GetDlgItemTextW
GetWindowRgn
wvsprintfA
SetForegroundWindow
CharUpperA
GetMenuItemInfoW
LoadCursorW
wvsprintfW
SetDlgItemTextA
IsIconic
InsertMenuA
gdi32
CreatePolyPolygonRgn
AddFontResourceW
RemoveFontResourceA
CreateFontIndirectExW
AddFontResourceA
CreateICW
CreateScalableFontResourceW
RemoveFontResourceExA
CreateMetaFileW
CreateBitmap
RemoveFontResourceExW
CreatePolygonRgn
SetEnhMetaFileBits
CreateEllipticRgn
CreateColorSpaceW
Sections
.edata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 13KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.oUKQUW Size: 104KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tQdRF Size: 109KB - Virtual size: 174KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ