Static task
static1
Behavioral task
behavioral1
Sample
fa5785e001894db21a40eee6b69d812381c9610b008e2e8984e2e8a1eaf02922.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fa5785e001894db21a40eee6b69d812381c9610b008e2e8984e2e8a1eaf02922.exe
Resource
win10v2004-20220812-en
General
-
Target
fa5785e001894db21a40eee6b69d812381c9610b008e2e8984e2e8a1eaf02922
-
Size
165KB
-
MD5
54acda4f8ee538ab6b838a9963fad739
-
SHA1
03724fdd7fee77294f4979bd77a4892ffc5b6f4b
-
SHA256
fa5785e001894db21a40eee6b69d812381c9610b008e2e8984e2e8a1eaf02922
-
SHA512
5409c1618ec9b71f63860b2246dea91c03480e67a47b7e79879027c24bf9967115b2a5d6b501aa2cf81199dabb159c8946a59c16653ee34fc3ecf09602007e7e
-
SSDEEP
3072:/fZv68M421MOX/MUXgCwM71YB+rG6XgLEgfOfn:wG2GS/MU6kYjGgLNK
Malware Config
Signatures
Files
-
fa5785e001894db21a40eee6b69d812381c9610b008e2e8984e2e8a1eaf02922.exe windows x86
76c07a0944e01ac97417f9d244834304
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
Shell_NotifyIconA
SHGetFileInfoA
SHGetSpecialFolderLocation
DragQueryFileA
msvcrt
rand
memmove
log10
user32
CallWindowProcA
BeginPaint
EnableMenuItem
GetCursorPos
CharNextA
EnumWindows
GetSysColor
GetMenuItemInfoA
DrawEdge
RegisterClassA
DrawTextA
GetMessagePos
CreatePopupMenu
GetCapture
EqualRect
EnableWindow
DefWindowProcA
MessageBoxA
GetMenuState
GetClientRect
GetMenuItemCount
GetWindow
SetWindowPos
SystemParametersInfoA
DeferWindowPos
DrawIcon
DrawIconEx
GetDCEx
IsChild
GetSysColorBrush
BeginDeferWindowPos
GetKeyNameTextA
DefMDIChildProcA
CharToOemA
GetMenuStringA
GetLastActivePopup
GetParent
GetPropA
SetWindowLongA
SetWindowTextA
TrackPopupMenu
GetMenuItemID
GetCursor
GetSubMenu
GetWindowTextA
GetDC
GetFocus
EndDeferWindowPos
DefFrameProcA
GetScrollRange
GetMenu
SetTimer
CallNextHookEx
FillRect
EnumChildWindows
CharLowerBuffA
GetForegroundWindow
SetCursor
FindWindowA
CreateIcon
ClientToScreen
kernel32
ReadFile
GetCurrentThreadId
GetModuleFileNameA
SetErrorMode
GetCommandLineA
GetStartupInfoA
LoadLibraryExA
CloseHandle
Sleep
GetDateFormatA
LoadLibraryA
CreateThread
GetOEMCP
GetModuleHandleA
GetFileType
EnumCalendarInfoA
GlobalFindAtomA
CompareStringA
FindClose
SetThreadLocale
ExitThread
SetLastError
GetVersion
WaitForSingleObject
VirtualQuery
LocalAlloc
GetEnvironmentStrings
SetEvent
FindFirstFileA
MoveFileExA
GetLastError
GetSystemDefaultLangID
GlobalAlloc
DeleteCriticalSection
GetVersionExA
HeapAlloc
FormatMessageA
LocalReAlloc
SetFilePointer
GetCPInfo
VirtualAllocEx
GetStdHandle
WriteFile
ExitProcess
GetDiskFreeSpaceA
GetTickCount
GetFileAttributesA
GetLocaleInfoA
GetFullPathNameA
lstrlenA
SetHandleCount
CreateEventA
GetCurrentProcessId
ResetEvent
GetProcessHeap
FreeLibrary
CreateFileA
HeapDestroy
DeleteFileA
lstrcpynA
GetCurrentThread
RaiseException
GetACP
Sections
.text Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 3KB - Virtual size: 127KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: 119KB - Virtual size: 119KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ