Static task
static1
Behavioral task
behavioral1
Sample
fe6fb8d16469ad05723bca2fbd620dfb69fa45cd3f887c0a2e0f10458af046d2.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
fe6fb8d16469ad05723bca2fbd620dfb69fa45cd3f887c0a2e0f10458af046d2.exe
Resource
win10v2004-20220812-en
General
-
Target
fe6fb8d16469ad05723bca2fbd620dfb69fa45cd3f887c0a2e0f10458af046d2
-
Size
542KB
-
MD5
879b513eaa11d7afbfc320f30caccd7a
-
SHA1
97e2c39da9ebf9a76f75751978a5682799a740f6
-
SHA256
fe6fb8d16469ad05723bca2fbd620dfb69fa45cd3f887c0a2e0f10458af046d2
-
SHA512
33249ffcca63202ea2f44586801408435b741bc40272802e99387c3939bdc249e6de406670c4414acf220f288024ba57d5b473feef541cce26fdc715cae23b57
-
SSDEEP
6144:7g634LnX+eheFht+8Vnyk6tAI5xJ4Oe1akah8lcQxa0N8C/J:s63WnLuhY8gAMxvfglcB0j
Malware Config
Signatures
Files
-
fe6fb8d16469ad05723bca2fbd620dfb69fa45cd3f887c0a2e0f10458af046d2.exe windows x86
82eda959347a2ddfaf2926b8c8b20d5b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCreateKeyA
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
RegCloseKey
comctl32
ImageList_Destroy
InitCommonControls
gdi32
SetTextColor
SelectObject
CreateCompatibleDC
BitBlt
DeleteObject
CreateCompatibleBitmap
GetClipBox
SetBkColor
GetObjectA
CreateBitmap
DeleteDC
SaveDC
RestoreDC
GetStockObject
SetViewportOrgEx
OffsetViewportOrgEx
SetMapMode
TextOutA
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetDeviceCaps
PtVisible
RectVisible
Escape
ExtTextOutA
SetViewportExtEx
SetBkMode
kernel32
RaiseException
HeapAlloc
HeapFree
GetCommandLineA
ExitProcess
HeapReAlloc
HeapSize
GetACP
TerminateProcess
Sleep
LCMapStringA
LCMapStringW
LockResource
GetStdHandle
GetFileType
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsA
GetStartupInfoA
RtlUnwind
MultiByteToWideChar
VirtualAlloc
IsBadWritePtr
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
UnmapViewOfFile
GetCurrentProcess
DuplicateHandle
CreateFileMappingA
MapViewOfFile
WritePrivateProfileStringA
SetEndOfFile
FlushFileBuffers
ReadFile
SetFilePointer
WriteFile
CreateFileA
SetErrorMode
GetOEMCP
TlsGetValue
GetCPInfo
GetProcessVersion
EnterCriticalSection
LocalReAlloc
TlsSetValue
TlsFree
GlobalReAlloc
LeaveCriticalSection
TlsAlloc
GlobalHandle
DeleteCriticalSection
InitializeCriticalSection
LocalAlloc
GetLastError
GlobalFlags
SetLastError
LocalFree
MulDiv
SuspendThread
WaitForSingleObject
ResumeThread
GetCurrentThread
GetPrivateProfileStringA
GetTickCount
GlobalAlloc
lstrcmp
HeapDestroy
HeapCreate
GetModuleFileNameA
WideCharToMultiByte
CloseHandle
InterlockedDecrement
InterlockedIncrement
lstrlen
lstrcat
GetCurrentThreadId
GlobalGetAtomNameA
lstrcmpi
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcpy
GlobalLock
GlobalUnlock
GlobalFree
LockResource
FindResourceA
LoadResource
lstrcpyn
VirtualQueryEx
VirtualFree
SetUnhandledExceptionFilter
GetEnvironmentStrings
GetEnvironmentStringsW
GetCurrentDirectoryA
FindClose
OpenProcess
LoadLibraryExA
LoadLibraryA
GetProcAddress
GetModuleHandleA
ReadProcessMemory
FreeLibrary
GetCurrentProcessId
GetVersion
AllocConsole
FindNextFileA
FindFirstFileA
InterlockedExchange
CreateRemoteThread
WriteProcessMemory
VirtualQuery
GetExitCodeThread
TerminateThread
GetThreadContext
SetThreadContext
shell32
ShellExecuteA
user32
ClientToScreen
TranslateMessage
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
WindowFromPoint
GetClassNameA
PtInRect
LoadCursorA
GetSysColorBrush
DestroyMenu
LoadStringA
GetCursorPos
ValidateRect
UpdateWindow
MapWindowPoints
GetSysColor
PeekMessageA
DispatchMessageA
GetFocus
SetFocus
AdjustWindowRectEx
ScreenToClient
CopyRect
GetTopWindow
PostMessageA
GetMenu
GetMenuItemCount
GetWindowTextA
DefWindowProcA
SetCursor
CallNextHookEx
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
RemovePropA
GetMessageTime
GetLastActivePopup
SetForegroundWindow
GetWindow
SetWindowPos
RegisterClipboardFormatA
SystemParametersInfoA
GetWindowPlacement
GetNextDlgTabItem
EndDialog
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetParent
GetDlgItem
IsWindowEnabled
GetDlgCtrlID
GetForegroundWindow
InsertMenuItemA
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
GetKeyState
LoadIconA
IsWindowVisible
IsWindow
GetWindowRect
RedrawWindow
SetWindowLongA
CallWindowProcA
CreatePopupMenu
GetMessagePos
InsertMenuA
TrackPopupMenuEx
GetMessageA
SendDlgItemMessageA
GetAsyncKeyState
MessageBoxA
SendMessageA
EnableWindow
GetMenuCheckMarkDimensions
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetWindowLongA
LoadBitmapA
SetTimer
KillTimer
ShowWindow
SetWindowTextA
IsDialogMessage
SetDlgItemTextA
GetDlgItemTextA
PostQuitMessage
CreateWindowExA
SetWindowsHookExA
WinHelpA
GetClassInfoA
RegisterClassA
ReleaseDC
GetDC
wsprintfA
GetMenuItemID
GetSubMenu
GetCapture
UnregisterClassA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
comdlg32
GetOpenFileNameA
GetSaveFileNameA
Sections
.text Size: 320KB - Virtual size: 320KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 168KB - Virtual size: 172KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.fix Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 46KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE