Static task
static1
Behavioral task
behavioral1
Sample
fc8bf45367e3211aa7aef1e49f94f720111c3d7e0c176fdd19503c7a50a5b007.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
fc8bf45367e3211aa7aef1e49f94f720111c3d7e0c176fdd19503c7a50a5b007.exe
Resource
win10v2004-20220901-en
General
-
Target
fc8bf45367e3211aa7aef1e49f94f720111c3d7e0c176fdd19503c7a50a5b007
-
Size
421KB
-
MD5
93c18e41f1ec2330cda0ca5eccc88879
-
SHA1
67c0f348a0da3363359ea73b5574e2abc3eebee0
-
SHA256
fc8bf45367e3211aa7aef1e49f94f720111c3d7e0c176fdd19503c7a50a5b007
-
SHA512
ad24c881071ebe17ea1f1555068c09de84a74c53b050c486b3d6722a1a91cb9df2b641795e55a709266dac9ed0461412c00177c31824040b81bd189a61313698
-
SSDEEP
12288:3MZzEQ386gH3rLW+Pz1ofcaMnrK07EUv6V:Qzb7ohofeLB
Malware Config
Signatures
Files
-
fc8bf45367e3211aa7aef1e49f94f720111c3d7e0c176fdd19503c7a50a5b007.exe windows x86
a5ef79afb4683fb9660d097910a5264b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
ShellExecuteExA
ExtractIconEx
advapi32
LogonUserW
CryptDestroyHash
CryptGetDefaultProviderW
DuplicateToken
LookupAccountNameA
RegNotifyChangeKeyValue
RegQueryValueExA
CryptSetHashParam
RegDeleteKeyA
CreateServiceW
RegEnumKeyA
RegDeleteValueW
RegOpenKeyExW
CryptEnumProviderTypesA
StartServiceW
RegQueryInfoKeyA
RegSetValueW
CryptGetProvParam
CryptSetProviderW
CryptSetKeyParam
RegDeleteValueA
CryptDestroyKey
RegDeleteKeyW
RegCloseKey
RegEnumKeyExA
wininet
InternetCanonicalizeUrlW
FtpSetCurrentDirectoryA
GetUrlCacheHeaderData
ResumeSuspendedDownload
user32
DrawFocusRect
GetGUIThreadInfo
OemToCharBuffA
DispatchMessageW
DlgDirSelectComboBoxExA
SetMessageQueue
GetClassLongW
GetWindowWord
LoadStringA
GetWindowModuleFileNameA
CreateDialogIndirectParamA
LoadIconW
SendMessageTimeoutW
DragDetect
RedrawWindow
GetClassNameA
DialogBoxParamA
GetClipCursor
IsChild
GetWindowContextHelpId
MessageBoxA
LoadIconA
SetMenuItemBitmaps
EnumWindowStationsA
kernel32
Sleep
GlobalGetAtomNameW
lstrcmpiW
RtlUnwind
VirtualQuery
MoveFileA
WriteConsoleOutputCharacterA
TlsGetValue
VirtualAlloc
LCMapStringA
GetCommandLineA
SetVolumeLabelW
GetTimeFormatW
FreeEnvironmentStringsA
GetThreadPriority
CompareStringA
GetCommandLineW
GetTimeFormatA
InterlockedIncrement
IsValidCodePage
HeapSize
GetStdHandle
GetStartupInfoW
UnhandledExceptionFilter
GetEnvironmentStrings
EnumSystemLocalesA
GetLogicalDriveStringsA
GetSystemTimeAsFileTime
VirtualFree
EnterCriticalSection
SetLastError
HeapCreate
TerminateProcess
WideCharToMultiByte
ExitProcess
GetFileType
GetOEMCP
LeaveCriticalSection
LocalLock
GetCPInfo
DeleteAtom
HeapAlloc
GetTickCount
GetProcessAffinityMask
TlsAlloc
FreeResource
GetCurrentThread
GetLastError
GetACP
LCMapStringW
GetUserDefaultLCID
GetLocaleInfoA
GetModuleFileNameW
EnumSystemLocalesW
CreateEventW
GetModuleHandleA
LoadLibraryA
GetLocaleInfoW
GetDateFormatA
GetDiskFreeSpaceW
GetStartupInfoA
InterlockedExchange
FindResourceA
DeleteCriticalSection
TlsSetValue
GetProcAddress
GetEnvironmentStringsW
SetHandleCount
QueryPerformanceCounter
SetUnhandledExceptionFilter
HeapFree
HeapDestroy
GetCurrentProcessId
WaitForMultipleObjects
MultiByteToWideChar
GetCurrentProcess
WriteFile
GetModuleFileNameA
ReadConsoleInputA
SetConsoleCtrlHandler
InitializeCriticalSection
CompareStringW
SetLocaleInfoA
GetStringTypeA
FreeLibrary
GetTimeZoneInformation
GetCurrentThreadId
GetVersionExA
SetEnvironmentVariableA
IsDebuggerPresent
GetStringTypeW
GetProcessHeap
IsValidLocale
GetShortPathNameA
lstrcmpA
FreeEnvironmentStringsW
CreateMailslotW
HeapReAlloc
InterlockedDecrement
TlsFree
VirtualUnlock
Sections
.text Size: 126KB - Virtual size: 125KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 277KB - Virtual size: 277KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ