Static task
static1
Behavioral task
behavioral1
Sample
f99449cb8b2d11963c460527b748f3de778c76546e0b64a7d5199224e5e07108.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f99449cb8b2d11963c460527b748f3de778c76546e0b64a7d5199224e5e07108.exe
Resource
win10v2004-20221111-en
General
-
Target
f99449cb8b2d11963c460527b748f3de778c76546e0b64a7d5199224e5e07108
-
Size
26KB
-
MD5
8cb395771ecdb91768d91bd5697e5c19
-
SHA1
b48cbabc7de237b0c2fc18de4fefe8ba89e5d7eb
-
SHA256
f99449cb8b2d11963c460527b748f3de778c76546e0b64a7d5199224e5e07108
-
SHA512
846812d1f3a05e1986dfa8c58eaa5af08d8bdd3e0ee576d58a5adb22874e38c2b0de61c306c985ec221a4dbddd2e20ca786040b308751f18c5cba307dc5e4061
-
SSDEEP
384:2iTo3URa+p3p0Yz6/+qTIWZtXizO7ymnawbEZ3CSbytUt0VS8s2ADp3fLLycWl/s:2v3IL3+TTIW3r7ymasEkg0dA8Nl/
Malware Config
Signatures
Files
-
f99449cb8b2d11963c460527b748f3de778c76546e0b64a7d5199224e5e07108.exe windows x86
569b70bc66833e5644b23e730fe26e30
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_wtempnam
fgetwc
_wspawnvp
labs
iswcntrl
strpbrk
longjmp
__p__wpgmptr
_beginthreadex
__p___mb_cur_max
_commode
_safe_fprem1
_CIsin
memchr
_adj_fdivr_m64
__argc
_putenv
_assert
rand
abs
_wexeclp
_spawnv
log
sprintf
_winminor
_mbsnbcnt
__p__winmajor
_wcreat
feof
mbstowcs
_wfdopen
_rotr
_wenviron
_mbslwr
_mbsnbcat
_pwctype
_cgets
_safe_fprem
fseek
_ismbbkpunct
user32
CharLowerW
ImpersonateDdeClientWindow
SetShellWindow
OemKeyScan
DispatchMessageA
SetPropA
EnumDisplaySettingsA
CreateWindowExA
ReuseDDElParam
DestroyMenu
CascadeWindows
GetGUIThreadInfo
DeferWindowPos
EnableScrollBar
wsprintfW
AdjustWindowRect
GetWindowTextW
ShowWindowAsync
EnumPropsExW
RegisterSystemThread
DestroyAcceleratorTable
LoadIconA
ChildWindowFromPointEx
DestroyCursor
DdeAccessData
GetWindowTextA
IsCharUpperA
kernel32
CreateMutexW
GetPriorityClass
GetStartupInfoW
FindNextFileA
GetModuleHandleW
GetLocalTime
Module32Next
LocalLock
ScrollConsoleScreenBufferW
WriteTapemark
FlushViewOfFile
GetVersion
EnumResourceLanguagesW
ReadDirectoryChangesW
lstrcmpA
SetErrorMode
QueryPerformanceFrequency
EnumResourceTypesA
FindFirstFileA
GetProfileIntA
ExitProcess
RemoveDirectoryA
OpenSemaphoreA
SetConsoleCursorInfo
GetStdHandle
GetModuleHandleW
Process32Next
EraseTape
lstrcmpW
lstrlenA
GetPrivateProfileSectionA
HeapWalk
SetConsoleTitleW
CallNamedPipeW
GetCompressedFileSizeW
IsValidCodePage
TryEnterCriticalSection
GetProcessHeap
GetTickCount
lstrcmpiA
GetCommandLineW
FindFirstChangeNotificationA
AreFileApisANSI
lstrcmpiW
GetCommModemStatus
IsValidLocale
VirtualFree
GetDiskFreeSpaceA
VirtualAlloc
SetHandleCount
GetVolumeInformationW
GlobalUnlock
GetLastError
WaitForSingleObject
GetModuleHandleA
gdi32
GetMiterLimit
SetICMProfileW
CreatePolygonRgn
GetPixel
SetLayout
CreateHalftonePalette
CreatePenIndirect
GetROP2
CancelDC
UpdateICMRegKeyA
SetLayout
GetTransform
CreatePolyPolygonRgn
ResetDCA
GetObjectA
SwapBuffers
GetDeviceGammaRamp
SetViewportOrgEx
GetTextCharset
GetMapMode
GetObjectType
SetTextAlign
GdiGetBatchLimit
CreateMetaFileW
GetArcDirection
GetPolyFillMode
GetTextMetricsA
GetCurrentPositionEx
advapi32
ChangeServiceConfigW
GetServiceKeyNameA
GetSecurityDescriptorDacl
SetSecurityInfoExA
GetSidSubAuthorityCount
GetOverlappedAccessResults
CryptDestroyHash
RevertToSelf
InitializeSecurityDescriptor
GetAuditedPermissionsFromAclW
SetEntriesInAclA
ReadEventLogA
GetFileSecurityA
TrusteeAccessToObjectA
RegEnumKeyA
ConvertSecurityDescriptorToAccessW
LookupAccountNameW
GetSecurityInfoExW
LookupPrivilegeDisplayNameW
RegCreateKeyW
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.fgg Size: 6KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vvey Size: 5KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ