Static task
static1
Behavioral task
behavioral1
Sample
fb3d2ab87a7ebc3f2420015566092e13d5f50bfe3ff28f00793eb60e463097db.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
fb3d2ab87a7ebc3f2420015566092e13d5f50bfe3ff28f00793eb60e463097db.exe
Resource
win10v2004-20221111-en
General
-
Target
fb3d2ab87a7ebc3f2420015566092e13d5f50bfe3ff28f00793eb60e463097db
-
Size
2.5MB
-
MD5
2c8190a31e463cd1f4f995577363f326
-
SHA1
4f1467c19dd57ca2681c5d23684974cb02b24be2
-
SHA256
fb3d2ab87a7ebc3f2420015566092e13d5f50bfe3ff28f00793eb60e463097db
-
SHA512
f8414617dd9e02c882dff4882e17da6f345edbf8373ee88dfe839a5a5d16000949b9ac844a09e1a5eb7e797055e6acab726e0518a46b149e8bae1e5af3930beb
-
SSDEEP
49152:WjfYxO/duNecrynl7idvGWMpTHziOTPUWjT5DsM+0xTxPBU:wfcO/duN/ryAMWmlQWjOM+0
Malware Config
Signatures
Files
-
fb3d2ab87a7ebc3f2420015566092e13d5f50bfe3ff28f00793eb60e463097db.exe windows x86
f0e6bb92d5991302ee2b2d0eb9896690
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathStripToRootW
PathIsUNCW
PathFindFileNameW
PathFileExistsW
kernel32
LockFile
SetEndOfFile
UnlockFile
DuplicateHandle
LoadLibraryExW
LoadLibraryA
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
FormatMessageW
EncodePointer
GetCurrentThreadId
FreeLibrary
GlobalDeleteAtom
lstrcmpW
GlobalAddAtomW
GlobalFindAtomW
GetFileAttributesW
GetFileAttributesExW
GetFileSizeEx
GetFileTime
SetFileAttributesW
SystemTimeToTzSpecificLocalTime
SetErrorMode
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GlobalReAlloc
GlobalHandle
LocalReAlloc
lstrcmpA
GlobalFlags
GetVersionExW
CompareStringW
GetLocaleInfoW
GetCurrentDirectoryW
GetUserDefaultLCID
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
ResetEvent
WaitForSingleObjectEx
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
OutputDebugStringW
CreateDirectoryW
GetLongPathNameW
GetVolumeInformationW
GetFullPathNameW
OpenProcess
GetExitCodeProcess
lstrcpyW
CreateProcessW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetSystemInfo
ReleaseMutex
CreateMutexW
DeviceIoControl
SetPriorityClass
VerSetConditionMask
RtlUnwind
SetFilePointerEx
GetConsoleMode
ReadConsoleW
GetConsoleCP
GetFileType
HeapQueryInformation
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
GetCommandLineA
GetCommandLineW
ExitProcess
GetStdHandle
FindFirstFileExW
GetDriveTypeW
PeekNamedPipe
GetStringTypeW
GetTimeZoneInformation
LCMapStringW
IsValidLocale
EnumSystemLocalesW
SetStdHandle
WriteConsoleW
IsValidCodePage
GetOEMCP
GetCPInfo
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetConsoleCtrlHandler
FlushFileBuffers
LoadLibraryW
GetModuleHandleA
SetLastError
GetEnvironmentVariableW
GetPrivateProfileIntW
GetPrivateProfileStringW
WritePrivateProfileStringW
CreateThread
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetEvent
WaitForSingleObject
Sleep
CloseHandle
CreateEventW
GetCurrentProcessId
GetModuleFileNameW
MapViewOfFile
UnmapViewOfFile
CreateFileMappingW
OpenFileMappingW
GetTempPathW
CreateFileW
MoveFileExW
GetFileInformationByHandle
SetFileTime
FileTimeToLocalFileTime
LocalFileTimeToFileTime
FileTimeToDosDateTime
DosDateTimeToFileTime
CreateFileA
SetFileAttributesA
GetFileAttributesA
GetFileSize
WriteFile
ReadFile
SetFilePointer
DeleteFileW
GetLastError
FindClose
SystemTimeToFileTime
FileTimeToSystemTime
GetTickCount
FindFirstFileW
MoveFileW
GetSystemDirectoryW
lstrlenW
CopyFileW
GetProcAddress
LocalAlloc
LocalFree
OutputDebugStringA
GetACP
MultiByteToWideChar
HeapAlloc
HeapFree
GetProcessHeap
GetCurrentProcess
GetModuleHandleW
FindNextFileW
LockResource
LoadResource
SizeofResource
FindResourceW
RemoveDirectoryW
WideCharToMultiByte
DecodePointer
HeapReAlloc
HeapSize
RaiseException
InitializeCriticalSectionAndSpinCount
GetSystemTime
FormatMessageA
SleepEx
WaitForMultipleObjects
ExpandEnvironmentStringsA
GetSystemDirectoryA
VerifyVersionInfoA
SwitchToFiber
DeleteFiber
CreateFiber
ConvertFiberToThread
ConvertThreadToFiber
SetConsoleMode
ReadConsoleA
user32
wsprintfW
PostQuitMessage
LoadBitmapW
SetMenuItemInfoW
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
EnableMenuItem
CheckMenuItem
DestroyMenu
RealChildWindowFromPoint
ClientToScreen
TabbedTextOutW
GrayStringW
DrawTextExW
DrawTextW
LoadCursorW
GetSysColorBrush
ReleaseDC
GetDC
GetWindowThreadProcessId
SetWindowTextW
IsWindowEnabled
GetMonitorInfoW
MonitorFromWindow
WinHelpW
LoadIconW
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExW
GetLastActivePopup
GetTopWindow
GetClassNameW
GetClassLongW
PtInRect
IsWindow
GetUserObjectInformationW
CopyRect
GetSysColor
MapWindowPoints
ScreenToClient
MessageBoxW
AdjustWindowRectEx
GetWindowRect
RemovePropW
GetPropW
SetPropW
RedrawWindow
ValidateRect
EndPaint
BeginPaint
SetForegroundWindow
GetForegroundWindow
SetMenu
GetMenu
EnableWindow
GetCapture
GetKeyState
GetFocus
GetDlgCtrlID
GetProcessWindowStation
SetWindowLongW
GetClientRect
SetRectEmpty
OffsetRect
GetParent
CharUpperW
GetSystemMetrics
GetSubMenu
GetMenuItemID
GetMenuItemCount
SendMessageW
GetDlgItem
IsIconic
EndDeferWindowPos
DeferWindowPos
BeginDeferWindowPos
SetWindowPos
DestroyWindow
IsMenu
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
CallWindowProcW
DefWindowProcW
PostMessageW
GetMessageTime
GetMessagePos
PeekMessageW
DispatchMessageW
RegisterWindowMessageW
GetWindow
GetWindowLongW
GetWindowTextW
GetScrollPos
advapi32
ReportEventW
RegOpenKeyW
DuplicateTokenEx
LookupAccountSidW
GetTokenInformation
ImpersonateLoggedOnUser
RegEnumKeyW
RegCreateKeyExW
CryptAcquireContextW
CryptReleaseContext
LookupAccountNameW
GetSecurityDescriptorDacl
SetSecurityDescriptorDacl
GetSecurityDescriptorControl
InitializeSecurityDescriptor
AddAccessAllowedAce
GetAce
AddAce
GetAclInformation
InitializeAcl
GetLengthSid
EqualSid
OpenProcessToken
RevertToSelf
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegDeleteValueW
RegCloseKey
CryptGenRandom
DeregisterEventSource
RegisterEventSourceW
shell32
SHGetFolderPathW
SHGetSpecialFolderPathW
ole32
CoCreateInstance
CoUninitialize
CoInitialize
urlmon
URLDownloadToFileW
wininet
InternetSetFilePointer
InternetCloseHandle
InternetOpenW
InternetReadFile
HttpQueryInfoW
InternetOpenUrlW
cabinet
ord22
ord21
ord20
ord14
ord13
ord11
ord10
ord23
oleacc
LresultFromObject
CreateStdAccessibleObject
gdi32
SetMapMode
SelectObject
SaveDC
RestoreDC
RectVisible
PtVisible
ScaleViewportExtEx
GetStockObject
ScaleWindowExtEx
ExtTextOutW
GetClipBox
OffsetViewportOrgEx
SetWindowExtEx
SetViewportOrgEx
SetViewportExtEx
Escape
DeleteObject
DeleteDC
TextOutW
CreateBitmap
SetTextColor
SetBkColor
GetDeviceCaps
winspool.drv
DocumentPropertiesW
ClosePrinter
OpenPrinterW
oleaut32
VariantInit
VariantClear
VariantChangeType
wldap32
ord26
ord301
ord200
ord143
ord46
ord211
ord60
ord50
ord41
ord22
ord27
ord32
ord33
ord35
ord79
ord30
ws2_32
WSAStartup
WSACleanup
recv
send
WSAGetLastError
gethostname
select
WSASetLastError
bind
closesocket
connect
getpeername
getsockname
getsockopt
htons
ntohs
setsockopt
socket
WSAIoctl
getaddrinfo
freeaddrinfo
recvfrom
sendto
accept
listen
ioctlsocket
__WSAFDIsSet
Sections
.text Size: 1.7MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 562KB - Virtual size: 562KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.giats Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 229KB - Virtual size: 228KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 82KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ