?VirtualMemory@@YGKPAK@Z
Static task
static1
Behavioral task
behavioral1
Sample
fb403e796fc482cde64e89228d3dcb9c255339a8fd6b0ef226136a2174e8dbee.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
fb403e796fc482cde64e89228d3dcb9c255339a8fd6b0ef226136a2174e8dbee.exe
Resource
win10v2004-20221111-en
General
-
Target
fb403e796fc482cde64e89228d3dcb9c255339a8fd6b0ef226136a2174e8dbee
-
Size
787KB
-
MD5
e66c761e16aab4e85af050bdbd8fb0f4
-
SHA1
b6f1e177ead8f7105b0f4efdacc521b67ca7bf20
-
SHA256
fb403e796fc482cde64e89228d3dcb9c255339a8fd6b0ef226136a2174e8dbee
-
SHA512
084729a10a2acabec38c2ac8db3cabc039ae7871e2d5d9fed210b1a05010fc6ab71cedf625df197844c7b6afbd16ca97f6a30b7b5dbcf05b2a7c04e8fcbd2897
-
SSDEEP
12288:9tsAoM34uqSst/U2IRenNak1l4uXXjkvR8+4vo15E1aqcErpOA3cfB1/JVVk:cAP4tc2MUNRXzk58e5SaqrUvfG
Malware Config
Signatures
Files
-
fb403e796fc482cde64e89228d3dcb9c255339a8fd6b0ef226136a2174e8dbee.exe windows x86
c375db828abd6a067a6c4010eb4c495e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
StrRChrIA
PathIsUNCA
StrToIntA
StrRStrIW
PathIsRootA
PathGetArgsW
PathIsNetworkPathA
PathIsNetworkPathW
kernel32
FindFirstVolumeMountPointA
ReleaseMutex
GetDiskFreeSpaceExA
OpenEventA
SetFileApisToOEM
GetProcAddress
MulDiv
GetComputerNameExA
SizeofResource
VirtualQueryEx
GetWindowsDirectoryA
GetTickCount
GetSystemDefaultUILanguage
GetDriveTypeW
GetSystemDefaultLangID
user32
SetActiveWindow
GetProcessWindowStation
GrayStringA
GetCapture
UnregisterClassA
GetWindowLongA
GetDesktopWindow
IsCharLowerW
SetCaretPos
RegisterClipboardFormatW
GetDlgItemTextA
DialogBoxParamA
DestroyIcon
MessageBoxExA
GetShellWindow
DispatchMessageW
FindWindowA
gdi32
GetStockObject
TextOutW
GetFontData
RoundRect
RectVisible
EnumFontFamiliesExW
PolyBezier
GetSystemPaletteEntries
GetNearestPaletteIndex
GetObjectW
SetPaletteEntries
OffsetRgn
PtInRegion
GetTextCharsetInfo
CloseMetaFile
Exports
Exports
Sections
.text Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 737KB - Virtual size: 1004KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.mdata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.itext Size: 512B - Virtual size: 236B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ