Static task
static1
Behavioral task
behavioral1
Sample
fb5f6ccbb5b84d7b26357319ead834a48f8644f8db7618544d0dabff3a670558.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fb5f6ccbb5b84d7b26357319ead834a48f8644f8db7618544d0dabff3a670558.exe
Resource
win10v2004-20220812-en
General
-
Target
fb5f6ccbb5b84d7b26357319ead834a48f8644f8db7618544d0dabff3a670558
-
Size
13KB
-
MD5
42b5606c7c39ccb127617736cd6bc749
-
SHA1
2964684cba2893cdb60b8a8cfd30266854c6d51c
-
SHA256
fb5f6ccbb5b84d7b26357319ead834a48f8644f8db7618544d0dabff3a670558
-
SHA512
da9b9aa8c3476c7059e0375ef0f6d205ee0de328e13c7f475c019629598aa60053e42aeaae0d940e26cf9735554566574b2f639b7396eda798cf7594241579ab
-
SSDEEP
384:vuIFDw/eEEKgpvuI0P+laHH0D9pLd/NySBjHZOvL:PDPG+laU9Zd/NNHZOvL
Malware Config
Signatures
Files
-
fb5f6ccbb5b84d7b26357319ead834a48f8644f8db7618544d0dabff3a670558.exe windows x86
27c356765b9ab8092cbb8eb7c6552602
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemInfo
GetProcAddress
LoadLibraryA
VirtualAlloc
GetWindowsDirectoryW
user32
DdeClientTransaction
DdeConnect
DdeDisconnectList
DdeGetLastError
DdeImpersonateClient
DdeReconnect
DefDlgProcA
DefWindowProcW
DeferWindowPos
DestroyAcceleratorTable
DialogBoxParamA
DlgDirListComboBoxA
DlgDirListW
DrawIconEx
EndTask
EnumClipboardFormats
EnumDesktopsA
EnumDisplaySettingsA
EnumDisplaySettingsExW
EnumDisplaySettingsW
EqualRect
ExcludeUpdateRgn
ExitWindowsEx
FillRect
FindWindowExA
FindWindowW
FlashWindowEx
FrameRect
GetActiveWindow
GetClassInfoExW
GetClassNameA
GetClipCursor
GetDC
GetDCEx
GetDlgItemInt
GetDlgItemTextA
GetDlgItemTextW
GetFocus
GetGUIThreadInfo
GetIconInfo
GetKeyboardLayout
GetKeyboardLayoutNameW
GetKeyboardType
GetMenuContextHelpId
GetMenuInfo
GetMenuItemID
GetMenuItemInfoA
GetMenuItemInfoW
GetMessageExtraInfo
GetMessageTime
GetMessageW
GetNextDlgGroupItem
GetParent
GetQueueStatus
GetScrollBarInfo
GetSystemMenu
DdeAddData
GetUserObjectInformationA
GetWindowLongA
GetWindowModuleFileNameA
GetWindowTextA
GetWindowTextW
IMPSetIMEW
InSendMessageEx
InflateRect
InvalidateRgn
IsCharAlphaNumericW
IsClipboardFormatAvailable
IsDlgButtonChecked
IsRectEmpty
IsWindowEnabled
IsWindowVisible
LoadAcceleratorsA
LoadBitmapW
LoadCursorFromFileA
LoadImageA
LoadKeyboardLayoutW
MapVirtualKeyA
MapVirtualKeyExA
MessageBeep
ModifyMenuA
MonitorFromRect
MsgWaitForMultipleObjects
OpenDesktopA
RealGetWindowClass
RegisterClassA
RegisterClipboardFormatW
RegisterDeviceNotificationW
SendIMEMessageExA
SendMessageTimeoutW
SendMessageW
SetActiveWindow
SetCaretBlinkTime
SetCaretPos
SetCursor
SetDlgItemTextW
SetLastErrorEx
SetMenu
SetMenuItemBitmaps
SetProcessDefaultLayout
SetProcessWindowStation
SetShellWindow
SetWindowTextA
SetWindowTextW
SetWindowWord
SetWindowsHookExA
ShowOwnedPopups
TabbedTextOutA
ToUnicodeEx
TrackMouseEvent
UnionRect
UnregisterClassW
UnregisterDeviceNotification
WINNLSEnableIME
WINNLSGetEnableStatus
wsprintfW
wvsprintfW
DdeAbandonTransaction
CreateMenu
CreateMDIWindowW
CreateIcon
CreateDialogIndirectParamW
CreateAcceleratorTableW
CountClipboardFormats
CharUpperBuffW
CharToOemW
CharLowerBuffA
CharLowerA
ChangeMenuW
ChangeDisplaySettingsA
CascadeChildWindows
CallNextHookEx
CallMsgFilterA
CallMsgFilter
BroadcastSystemMessageW
BroadcastSystemMessageA
BeginPaint
AdjustWindowRect
GetSystemMetrics
comdlg32
ChooseColorW
ChooseFontA
ChooseFontW
CommDlgExtendedError
FindTextA
ReplaceTextW
ReplaceTextA
PrintDlgW
PrintDlgExW
PrintDlgExA
PrintDlgA
PageSetupDlgW
PageSetupDlgA
GetSaveFileNameW
GetSaveFileNameA
GetOpenFileNameW
GetOpenFileNameA
GetFileTitleW
GetFileTitleA
FindTextW
ChooseColorA
ole32
CLSIDFromProgID
CLSIDFromProgIDEx
CoAllowSetForegroundWindow
CoBuildVersion
CoCreateInstance
CoDisconnectObject
CoFileTimeNow
CoFreeAllLibraries
CoGetCallContext
CoGetCancelObject
CoGetClassObject
CoGetCurrentLogicalThreadId
CoGetCurrentProcess
CoGetMarshalSizeMax
CoGetObject
CoGetObjectContext
CoGetStandardMarshal
CoGetTreatAsClass
CoInitialize
CoInitializeSecurity
CoInitializeWOW
CoMarshalHresult
CoQueryAuthenticationServices
CoRegisterChannelHook
CoRegisterMessageFilter
CoRegisterSurrogate
CoRegisterSurrogateEx
CoReleaseServerProcess
CoRevokeMallocSpy
CoSetProxyBlanket
CoSwitchCallContext
CoTaskMemAlloc
CoTaskMemFree
CoTreatAsClass
CoUnloadingWOW
CoUnmarshalInterface
CreateAntiMoniker
CreateDataCache
CreateGenericComposite
CreateILockBytesOnHGlobal
CreateObjrefMoniker
CreateOleAdviseHolder
CreatePointerMoniker
CreateStdProgressIndicator
FmtIdToPropStgName
FreePropVariantArray
GetConvertStg
GetDocumentBitStg
GetHGlobalFromILockBytes
GetRunningObjectTable
HACCEL_UserMarshal
HACCEL_UserUnmarshal
HBITMAP_UserFree
HBITMAP_UserMarshal
HBRUSH_UserFree
HDC_UserFree
HENHMETAFILE_UserMarshal
HENHMETAFILE_UserSize
HGLOBAL_UserMarshal
HGLOBAL_UserUnmarshal
HICON_UserMarshal
HMENU_UserFree
HMENU_UserMarshal
HMENU_UserSize
HMETAFILE_UserFree
HMETAFILE_UserSize
HMETAFILE_UserUnmarshal
HPALETTE_UserFree
HWND_UserMarshal
OleCreateDefaultHandler
OleCreateEmbeddingHelper
OleCreateFromDataEx
OleCreateLinkEx
OleCreateLinkFromDataEx
OleCreateLinkToFile
OleCreateMenuDescriptor
OleCreateStaticFromData
OleDraw
OleGetIconOfClass
OleInitializeWOW
OleIsRunning
OleMetafilePictFromIconAndLabel
OleNoteObjectVisible
OleQueryCreateFromData
OleQueryLinkFromData
OleRegGetUserType
OleSave
OleSaveToStream
OleSetClipboard
OleUninitialize
OpenOrCreateStream
PropVariantCopy
ReadFmtUserTypeStg
ReadStringStream
RegisterDragDrop
RevokeDragDrop
SNB_UserFree
SNB_UserMarshal
SNB_UserSize
STGMEDIUM_UserFree
STGMEDIUM_UserSize
STGMEDIUM_UserUnmarshal
StgConvertPropertyToVariant
StgCreateDocfile
StgCreateDocfileOnILockBytes
StgCreatePropStg
StgCreateStorageEx
StgGetIFillLockBytesOnFile
StgGetIFillLockBytesOnILockBytes
StgOpenPropStg
StgOpenStorage
StgOpenStorageOnILockBytes
StgPropertyLengthAsVariant
StgSetTimes
StringFromIID
UtConvertDvtd32toDvtd16
UtGetDvtd32Info
WdtpInterfacePointer_UserSize
WriteClassStg
WriteClassStm
WriteOleStg
Sections
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 620B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text6 Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text7 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text5 Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ