Static task
static1
Behavioral task
behavioral1
Sample
f4fc9730c244d610ce2a1ecaf24c28f49e03cf3f923d8fbac8f8dd602ef0a985.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f4fc9730c244d610ce2a1ecaf24c28f49e03cf3f923d8fbac8f8dd602ef0a985.exe
Resource
win10v2004-20221111-en
General
-
Target
f4fc9730c244d610ce2a1ecaf24c28f49e03cf3f923d8fbac8f8dd602ef0a985
-
Size
300KB
-
MD5
0f86866aed7cd33528f61cdbdc1b8780
-
SHA1
fafda4c7ea96c123154cd7b3ef3716a8a139dfb1
-
SHA256
f4fc9730c244d610ce2a1ecaf24c28f49e03cf3f923d8fbac8f8dd602ef0a985
-
SHA512
5641e794d94fc1062c5c7f54b7f91fce5ad578db17abf5c9f662cc3568a01842253275e823f23a7b4c3870c97206cf6ef18dd6e2c09180add13b83aa8ae834a1
-
SSDEEP
6144:ppiOn9VcuFLx3v+4fFXA8Pgh8Yl+V6UK71YCRiuLVsnDuN:/hn/FLgW9Ypl2DK7JbRsnDuN
Malware Config
Signatures
Files
-
f4fc9730c244d610ce2a1ecaf24c28f49e03cf3f923d8fbac8f8dd602ef0a985.exe windows x86
d57dcbfed3f200c699a4f379ddc6c498
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FlushFileBuffers
GetPrivateProfileStringA
GetTempFileNameA
SetVolumeLabelW
GetCommState
PrepareTape
InterlockedDecrement
MultiByteToWideChar
ReadDirectoryChangesW
GetProcessWorkingSetSize
CreateIoCompletionPort
FatalAppExitA
SuspendThread
MoveFileA
EnumCalendarInfoW
GetPriorityClass
GetDiskFreeSpaceW
FindNextFileW
SetConsoleCursorPosition
FindAtomW
MapViewOfFile
WritePrivateProfileSectionW
ReleaseSemaphore
Sleep
lstrcmpiA
CreateMutexW
HeapSize
GetComputerNameW
CopyFileW
WriteConsoleW
LoadLibraryA
WriteConsoleInputW
EnumDateFormatsW
GetEnvironmentStrings
GetCurrentDirectoryW
OpenEventA
FlushInstructionCache
SetTimeZoneInformation
_llseek
FileTimeToDosDateTime
GetEnvironmentVariableA
FindResourceW
WriteFileGather
FindCloseChangeNotification
_hread
GetVolumeInformationA
SetCommTimeouts
FindNextChangeNotification
WriteFile
GetThreadTimes
DeleteCriticalSection
UpdateResourceA
GetTapePosition
ClearCommBreak
GetCompressedFileSizeA
GetAtomNameW
GetConsoleTitleA
GetTickCount
SetFileAttributesA
ClearCommError
GetConsoleOutputCP
CreateEventA
LoadLibraryExA
lstrcpyW
SetLocalTime
RemoveDirectoryA
GetPrivateProfileSectionW
GetVolumeInformationW
SetSystemTime
BackupRead
GetProcessAffinityMask
InitializeCriticalSectionAndSpinCount
InterlockedExchangeAdd
CancelWaitableTimer
QueryPerformanceCounter
VirtualProtect
GetVersionExA
GetModuleHandleA
WritePrivateProfileStringA
GetStartupInfoA
EnumResourceNamesA
GetLogicalDrives
FindClose
InterlockedIncrement
GetCommConfig
GetSystemTimeAsFileTime
DeleteFiber
GetSystemDirectoryA
LoadResource
_lcreat
GetLongPathNameA
CreateProcessA
user32
IsCharUpperW
SetCaretPos
RegisterWindowMessageW
SetPropW
SetUserObjectSecurity
SetCursor
DrawFocusRect
GetKeyNameTextA
GetKeyboardLayout
FrameRect
UnhookWindowsHookEx
InsertMenuItemW
SetScrollInfo
CharLowerW
ExitWindowsEx
UpdateWindow
GrayStringW
GetMenuCheckMarkDimensions
GetMenuDefaultItem
RegisterWindowMessageA
CloseClipboard
LoadBitmapW
GetClipboardOwner
GetWindowRgn
GetPropW
MessageBoxIndirectW
gdi32
AddFontResourceA
GetClipRgn
SetWinMetaFileBits
comdlg32
FindTextW
FindTextA
advapi32
GetAce
GetSecurityDescriptorDacl
SetNamedSecurityInfoA
RegEnumKeyW
shell32
SHAddToRecentDocs
DoEnvironmentSubstW
ole32
CreateItemMoniker
OleConvertIStorageToOLESTREAM
PropVariantCopy
OleCreate
CoSuspendClassObjects
oleaut32
SafeArrayRedim
DispGetIDsOfNames
comctl32
ImageList_SetDragCursorImage
ImageList_DragShowNolock
ImageList_Remove
shlwapi
SHSetValueA
StrFormatByteSizeA
PathGetDriveNumberW
PathIsURLW
PathUndecorateW
UrlApplySchemeW
PathRenameExtensionW
SHSetValueW
PathFileExistsA
PathAppendW
PathStripPathA
StrToIntW
StrPBrkW
PathAddBackslashA
StrCatBuffA
setupapi
SetupCloseFileQueue
SetupDiGetDeviceRegistryPropertyA
SetupFindFirstLineA
SetupDiBuildClassInfoList
SetupDiDestroyDeviceInfoList
msvcrt
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
Sections
.text Size: 272KB - Virtual size: 270KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE