Static task
static1
Behavioral task
behavioral1
Sample
fda70344e8804b8fa4a0c311a64e3faa0dd3958f6038b802a3b482806eb3bbad.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fda70344e8804b8fa4a0c311a64e3faa0dd3958f6038b802a3b482806eb3bbad.exe
Resource
win10v2004-20220812-en
General
-
Target
fda70344e8804b8fa4a0c311a64e3faa0dd3958f6038b802a3b482806eb3bbad
-
Size
225KB
-
MD5
f4ba9ecd4e024ffbef9af4338abe5a5c
-
SHA1
5ebe49d17ecfbcc060efec370cd02a6be19db17c
-
SHA256
fda70344e8804b8fa4a0c311a64e3faa0dd3958f6038b802a3b482806eb3bbad
-
SHA512
d289460e92613a83e9b4070eab23f93872fe712749611043f63cca1dc1f1243adfcc5f218c2754780f1b93207dfaa1655682ef0c04ac6182e4e2b265950220d2
-
SSDEEP
6144:d5PxYo2FpTkOLFmSpuuKilJdbAqzVz5nG2Zh:d5SPJkiFmSgu/l7EaZ5nGOh
Malware Config
Signatures
Files
-
fda70344e8804b8fa4a0c311a64e3faa0dd3958f6038b802a3b482806eb3bbad.exe windows x86
e35b38a51b843c6b4c50cfbd9ccba510
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetExitCodeProcess
OpenMutexW
IsBadStringPtrW
ReplaceFileA
FreeResource
LoadLibraryA
CreateMailslotA
DuplicateHandle
ExpandEnvironmentStringsA
CreateSemaphoreW
GetExitCodeThread
IsBadReadPtr
GetExpandedNameW
CompareStringW
SetComputerNameW
GetThreadPriority
FatalAppExitA
lstrcat
FileTimeToSystemTime
GetFullPathNameW
GetDiskFreeSpaceA
OpenFile
GetFileAttributesW
FindAtomW
lstrcpy
GetVersionExA
EnumCalendarInfoA
SetLastError
GetCurrentDirectoryW
GetNumberFormatA
GetStartupInfoA
SleepEx
SetLocaleInfoW
GetLocalTime
GetProcAddress
GetStringTypeW
FindAtomA
GetProcessHeap
lstrcmpiW
GetAtomNameA
CreateMailslotW
GetVolumeInformationW
SetLocaleInfoA
SetCurrentDirectoryW
SetErrorMode
GetSystemTime
GetCurrentDirectoryA
user32
DrawTextW
SendDlgItemMessageW
GetDlgItemTextW
EmptyClipboard
FillRect
ReleaseDC
AppendMenuA
CharUpperA
GetDC
DestroyCursor
GetKeyState
GetSubMenu
GetWindowTextLengthA
ShowCursor
wvsprintfW
GetFocus
CallWindowProcW
LoadBitmapW
SetCursor
EndMenu
GetMenuItemRect
IsChild
MessageBeep
RegisterClassExA
SetDlgItemTextW
EnumClipboardFormats
WinHelpW
UpdateWindow
CheckDlgButton
CreatePopupMenu
BringWindowToTop
MonitorFromWindow
gdi32
SwapBuffers
SetPaletteEntries
MoveToEx
OffsetWindowOrgEx
GetBitmapBits
SetMapMode
GetMetaFileA
advapi32
ConvertSidToStringSidA
AllocateLocallyUniqueId
RegCreateKeyExW
opengl32
glColor3ui
glMap2d
glRectd
glTexCoord1i
sqlunirl
_ObjectOpenAuditAlarm_@48
_RemoveDirectory_@4
_GetCharABCWidths_@16
_VerQueryValue_@16
_RegCreateKey_@12
_CreateFontIndirect@4
_GetCommandLine_@0
Sections
.TY Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Zx Size: 4KB - Virtual size: 126KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.TB Size: 84KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.O Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.oNAHv Size: 4KB - Virtual size: 134KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.XprISq Size: 2KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.qFVR Size: 3KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gxrou Size: 4KB - Virtual size: 412KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xVG Size: 83KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ