Static task
static1
Behavioral task
behavioral1
Sample
fcf10a5e4392d94720b16436c22c8a39.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fcf10a5e4392d94720b16436c22c8a39.exe
Resource
win10v2004-20220812-en
General
-
Target
fcf10a5e4392d94720b16436c22c8a39.exe
-
Size
1.0MB
-
MD5
fcf10a5e4392d94720b16436c22c8a39
-
SHA1
537a6ed1679a0c53c68fb8eb75ecb467f238d748
-
SHA256
e85d49491c08d911e51bd4c99cba16eaaa9fa7f87e4175a5f895ed6b1a28659c
-
SHA512
5964a162ad616a526e482222e0cc32795b1ef94fb83b92162a60560b571af2033dd1920eac8d321e0ba43abea535f004cbde88950f9af9a5c0e5b7fa5083373b
-
SSDEEP
24576:FE2EKIAByxguEzF4ywcQK38FUuh2FnOPzV:ihN+xj3QKsF38OPh
Malware Config
Signatures
Files
-
fcf10a5e4392d94720b16436c22c8a39.exe.exe windows x86
5ce74fadc962100e747ed614a1788497
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetConsoleAliasA
GetModuleHandleW
CreateDirectoryExW
ReadConsoleInputA
GetTempPathW
GetSystemDirectoryW
RemoveDirectoryW
OutputDebugStringA
GetProcAddress
LocalAlloc
GetBinaryTypeA
SearchPathA
VerifyVersionInfoW
SetProcessPriorityBoost
EndUpdateResourceA
FindNextFileA
FindFirstVolumeA
LocalShrink
GlobalFlags
_llseek
UpdateResourceA
CreateActCtxW
CopyFileW
AddConsoleAliasW
CreateMutexA
GetCurrentActCtx
GetDiskFreeSpaceA
MoveFileW
GetLogicalDriveStringsA
SetEvent
MoveFileExW
CreateMailslotA
WriteConsoleInputA
TerminateThread
GetCurrentProcess
RtlCaptureContext
InterlockedCompareExchange
GetFileTime
lstrcatA
FindFirstFileW
FreeEnvironmentStringsW
SetErrorMode
InterlockedExchangeAdd
MoveFileWithProgressA
GetTickCount
SetLastError
GetPrivateProfileStructW
VerSetConditionMask
LoadLibraryA
GetLastError
DeleteFileA
GetStartupInfoW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleA
HeapFree
HeapAlloc
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
Sleep
ExitProcess
WriteFile
GetModuleFileNameA
GetModuleFileNameW
GetEnvironmentStringsW
GetCommandLineW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
RaiseException
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
VirtualAlloc
HeapReAlloc
SetFilePointer
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
InitializeCriticalSectionAndSpinCount
RtlUnwind
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
FlushFileBuffers
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
HeapSize
CloseHandle
CreateFileA
gdi32
SetBrushOrgEx
Sections
.text Size: 74KB - Virtual size: 74KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 921KB - Virtual size: 1.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 41KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ