Static task
static1
Behavioral task
behavioral1
Sample
fde4748e7bb81091c41bd9fc7368912426fff92a1c1d8834084ff4e9c51ef40b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
fde4748e7bb81091c41bd9fc7368912426fff92a1c1d8834084ff4e9c51ef40b.exe
Resource
win10v2004-20221111-en
General
-
Target
fde4748e7bb81091c41bd9fc7368912426fff92a1c1d8834084ff4e9c51ef40b
-
Size
103KB
-
MD5
5654b9214d1766e5bf7028cdf935664b
-
SHA1
8db957e3ef0e9c0a91e5eb26d815372109537335
-
SHA256
fde4748e7bb81091c41bd9fc7368912426fff92a1c1d8834084ff4e9c51ef40b
-
SHA512
ac576c2d9d0321f51397e29953a0a703146c7ffee16c5eb80907bf5b05ee4ec7c7891f1d0aaa88b4bcd93165c250cf8a3cdb8f3d561d8a3586d65ddd3c013f80
-
SSDEEP
1536:W/R59EcdXv6/tshEsbwjOdKVEegMyM6SYWArwUT9XhfcfRUNv79sESmv7V:W/HhZv6/WGs0jOwVE8dnABTXfcEzSEj
Malware Config
Signatures
Files
-
fde4748e7bb81091c41bd9fc7368912426fff92a1c1d8834084ff4e9c51ef40b.exe windows x86
c5beae03ee8403e4a260be14b4157ab0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalAddAtomA
VirtualAlloc
SetThreadLocale
GetCurrentProcessId
FreeLibrary
HeapDestroy
LoadLibraryA
GetProcAddress
DeleteFileA
GetCurrentThread
GetFileAttributesA
RaiseException
GetStringTypeW
LocalReAlloc
LocalFree
lstrcmpiA
GetStdHandle
CreateFileA
GetOEMCP
GetVersionExA
EnumCalendarInfoA
GetModuleFileNameA
GetStringTypeA
GetSystemDefaultLangID
SetFilePointer
GetStartupInfoA
EnterCriticalSection
CloseHandle
FindClose
FindResourceA
GetLastError
SetEndOfFile
Sleep
VirtualFree
GetCommandLineA
CreateEventA
GetCPInfo
VirtualQuery
FindFirstFileA
ReadFile
GlobalFindAtomA
ExitProcess
CreateThread
GetFileType
FormatMessageA
GetCurrentThreadId
InitializeCriticalSection
GetFullPathNameA
SetErrorMode
lstrcatA
MulDiv
GetDateFormatA
GetThreadLocale
lstrcpynA
WideCharToMultiByte
DeleteCriticalSection
GetModuleHandleA
GetEnvironmentStrings
GetTickCount
SizeofResource
GlobalDeleteAtom
HeapAlloc
HeapFree
lstrcmpA
SetLastError
GlobalAlloc
LoadLibraryExA
ExitThread
LockResource
LocalAlloc
MoveFileA
GetLocaleInfoA
GetCurrentProcess
lstrlenA
GetACP
GetLocalTime
GetFileSize
FreeResource
WriteFile
msvcrt
memcpy
malloc
strcmp
tan
calloc
user32
CreateIcon
ShowWindow
GetActiveWindow
IsChild
SetCursor
IsWindowEnabled
GetParent
SetWindowPos
IsMenu
GetIconInfo
IsWindowVisible
SetWindowTextA
GetMenuState
GetWindow
CreateWindowExA
GetMessagePos
EqualRect
RegisterClassA
CreateMenu
ShowScrollBar
CheckMenuItem
GetDlgItem
GetClientRect
EnableMenuItem
CallNextHookEx
DefMDIChildProcA
DefFrameProcA
GetDCEx
GetCursor
FrameRect
GetClassInfoA
GetCapture
DrawIcon
CharLowerA
GetScrollRange
GetCursorPos
GetSysColorBrush
DispatchMessageA
CallWindowProcA
TrackPopupMenu
DrawTextA
GetScrollPos
FillRect
GetClassLongA
CharNextA
DispatchMessageW
MessageBoxA
GetScrollInfo
GetMenuStringA
EndPaint
GetMenu
HideCaret
EnumChildWindows
IsDialogMessageA
GetPropA
GetSysColor
GetDC
CreatePopupMenu
DefWindowProcA
Sections
CODE Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
DATA Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ