Static task
static1
Behavioral task
behavioral1
Sample
FluxarPlayerLauncher.exe
Resource
win7-20230220-en
General
-
Target
FluxarPlayerLauncher.exe.bin
-
Size
1023KB
-
MD5
b2e485de55c77a1c1cad0cb4fc1620ab
-
SHA1
eb4d4f8e07d142441c4af08990688c5c63b6cc5a
-
SHA256
04a7dd7776f9eb759d0f950f5f2505802cb7669ace699ffe68510fc378bdbe94
-
SHA512
d2704dd36de35224e2a52ab3104dd09be5eed22f55478e22af4c4800d65fce0538899c855f63b5cc9a279ebe0097c29119cb37195565469e6df0b9026f688d96
-
SSDEEP
12288:X21yfES847WsxLpHQGfqn5ngkddy558TGkvO21dyWTygDmGMjjY:mcf1h71zqRZO8TGkvOo/TPDmVjjY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource FluxarPlayerLauncher.exe.bin
Files
-
FluxarPlayerLauncher.exe.bin.exe windows x86
68a4f41fee4de66293880f9085c143f1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleW
GetTempPathW
DeleteFileW
GetVersionExW
GetSystemTime
lstrcmpW
GetModuleFileNameW
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
lstrlenW
InterlockedDecrement
WaitForSingleObject
ReleaseMutex
CreateMutexW
SetEvent
ResetEvent
SetEndOfFile
CreateFileA
GetLocaleInfoW
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetModuleHandleA
GetStringTypeW
GetStringTypeA
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
LoadLibraryA
QueryPerformanceCounter
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
IsValidCodePage
GetOEMCP
GetACP
FlushFileBuffers
ReadFile
SetFilePointer
GetConsoleMode
GetConsoleCP
GetModuleFileNameA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
VirtualAlloc
VirtualFree
HeapCreate
OpenEventW
CreateEventW
GetLastError
GetCPInfo
LCMapStringW
LCMapStringA
CloseHandle
CreateEventA
FormatMessageA
LocalFree
CreateSemaphoreA
HeapAlloc
GetProcessHeap
HeapFree
GetSystemTimeAsFileTime
InitializeCriticalSection
DeleteCriticalSection
ReleaseSemaphore
InterlockedIncrement
GetCurrentThreadId
GetCurrentProcess
GetCurrentThread
DuplicateHandle
LoadLibraryW
GetProcAddress
FreeLibrary
CreateProcessW
RaiseException
TerminateProcess
GetTickCount
GetUserGeoID
GetGeoInfoW
CompareFileTime
FindFirstFileW
FindNextFileW
FindClose
Sleep
GetLocalTime
OpenProcess
CreateDirectoryW
VerSetConditionMask
VerifyVersionInfoW
GetDiskFreeSpaceExW
SetFileAttributesW
RemoveDirectoryW
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
GetShortPathNameW
FormatMessageW
CreateFileW
GetFileAttributesW
InitializeCriticalSectionAndSpinCount
EnterCriticalSection
LeaveCriticalSection
TlsAlloc
InterlockedExchange
InterlockedExchangeAdd
WaitForMultipleObjects
TerminateThread
QueueUserAPC
SleepEx
PostQueuedCompletionStatus
CreateIoCompletionPort
SetWaitableTimer
GetQueuedCompletionStatus
InterlockedCompareExchange
SetLastError
TlsGetValue
TlsSetValue
TlsFree
GetFileAttributesExW
GetFileSizeEx
MulDiv
SystemTimeToFileTime
OpenEventA
GetCurrentProcessId
CreateWaitableTimerW
ResumeThread
GetExitCodeProcess
lstrcpyW
lstrcatW
WriteFile
GetFileTime
DosDateTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
HeapDestroy
HeapReAlloc
HeapSize
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
GetStartupInfoW
ExitProcess
ExitThread
CreateThread
user32
InvalidateRect
ShowWindow
SetWindowLongW
CreateWindowExW
LoadBitmapW
DefWindowProcW
CallWindowProcW
GetParent
GetWindowRect
SendMessageW
GetWindowLongW
AllowSetForegroundWindow
SetWindowTextW
CharNextW
GetMessageW
TranslateAcceleratorW
TranslateMessage
DispatchMessageW
SetFocus
SetWindowPos
MessageBoxW
PostThreadMessageW
GetWindowThreadProcessId
EnumWindows
GetDlgItem
PostQuitMessage
BeginPaint
CharUpperW
EndPaint
LoadIconW
RegisterClassW
GetSystemMetrics
GetDC
ReleaseDC
SetTimer
FillRect
DestroyWindow
EnableWindow
IsWindowVisible
SetForegroundWindow
PostMessageW
GetWindowTextW
MessageBoxA
LoadAcceleratorsW
KillTimer
gdi32
Rectangle
SelectObject
CreatePen
GetStockObject
SetTextColor
CreateFontW
DeleteObject
GetDeviceCaps
SetBkMode
CreateSolidBrush
advapi32
GetTokenInformation
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
GetUserNameW
GetSidSubAuthority
CheckTokenMembership
DuplicateToken
RegDeleteKeyW
RegEnumKeyExW
RegDeleteValueW
IsValidSid
GetLengthSid
CopySid
OpenProcessToken
OpenThreadToken
GetSidLengthRequired
InitializeSid
RegSetValueExW
RegCreateKeyExW
CryptGetHashParam
CryptHashData
CryptDestroyHash
CryptReleaseContext
CryptCreateHash
CryptAcquireContextW
RegFlushKey
shell32
ShellExecuteW
SHGetFolderPathAndSubDirW
ShellExecuteExW
ole32
CoUninitialize
CoCreateInstance
CoCreateGuid
CoInitialize
StringFromGUID2
oleaut32
VariantClear
VariantInit
RegisterTypeLi
SysAllocString
SysFreeString
shlwapi
SHDeleteKeyW
StrCmpW
PathAddBackslashW
StrRChrW
StrCpyW
StrCmpNW
PathFileExistsW
StrDupW
StrStrW
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
sensapi
IsNetworkAlive
userenv
UnloadUserProfile
ws2_32
select
ioctlsocket
WSASend
WSASocketW
setsockopt
WSAGetLastError
getaddrinfo
freeaddrinfo
connect
getsockopt
WSARecv
WSASetLastError
WSAStartup
closesocket
WSACleanup
wininet
InternetSetOptionW
HttpQueryInfoW
HttpEndRequestW
HttpSendRequestW
HttpOpenRequestW
HttpAddRequestHeadersW
InternetCloseHandle
InternetConnectW
InternetWriteFile
HttpSendRequestExW
InternetReadFile
InternetQueryDataAvailable
InternetOpenW
comctl32
_TrackMouseEvent
InitCommonControlsEx
psapi
GetProcessImageFileNameW
EnumProcesses
iphlpapi
GetAdaptersInfo
Sections
.text Size: 424KB - Virtual size: 423KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 139KB - Virtual size: 138KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 39KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 2B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 379KB - Virtual size: 378KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ