Static task
static1
Behavioral task
behavioral1
Sample
bad372aaa8336a9d5bdcceb0531c7444.exe
Resource
win7-20220414-en
General
-
Target
bad372aaa8336a9d5bdcceb0531c7444.exe
-
Size
430KB
-
MD5
bad372aaa8336a9d5bdcceb0531c7444
-
SHA1
0a03ce5a9a860b4c25674f26b88dfb30a928a7ab
-
SHA256
152c56c8e3e63e3f6f4d9f0d5bd633f2a816d853d099997b0d9cf55445c8d045
-
SHA512
bf32791785309218d80ed2157b43d7a836097040e576cb0024b3824d7cf97ce549e82ed24d00104946f00b93c3f4a04416dda6c9aa2805f682caab8d169b9fb0
-
SSDEEP
6144:wJSGGD77F7GE6nTsFH7YGZ6tftgYzHAdcaDvmXYaiga3wVf:w4GGDHFxOIh6d7AdCY/
Malware Config
Signatures
Files
-
bad372aaa8336a9d5bdcceb0531c7444.exe.exe windows x86
501b246be07388174c9f9a65fef86aa0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MoveFileExW
OpenJobObjectA
InterlockedDecrement
GetCurrentProcess
GetEnvironmentStringsW
GetUserDefaultLCID
GetConsoleAliasesLengthA
GetUserDefaultLangID
LoadLibraryW
CreateEventA
SetConsoleMode
GetBinaryTypeA
GetGeoInfoA
GetSystemDirectoryA
lstrcmpW
GetShortPathNameA
FreeLibrary
SetLastError
GetProcAddress
GetAtomNameA
LoadLibraryA
LocalAlloc
RemoveDirectoryW
GetDiskFreeSpaceA
GetModuleFileNameA
GetCommTimeouts
EnumCalendarInfoExA
LCMapStringW
CreateFileW
RaiseException
FindResourceA
GetConsoleAliasesLengthW
SetDefaultCommConfigA
FlushFileBuffers
SetStdHandle
MultiByteToWideChar
EncodePointer
DecodePointer
GetCommandLineA
HeapSetInformation
GetStartupInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
IsProcessorFeaturePresent
GetCPInfo
InterlockedIncrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
GetCurrentThreadId
GetLastError
EnterCriticalSection
LeaveCriticalSection
Sleep
HeapSize
ExitProcess
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
SetFilePointer
GetModuleFileNameW
FreeEnvironmentStringsW
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapFree
GetStringTypeW
RtlUnwind
HeapAlloc
HeapReAlloc
WriteConsoleW
CloseHandle
user32
ClientToScreen
gdi32
GetCharWidthFloatA
advapi32
ImpersonateAnonymousToken
winhttp
WinHttpSetTimeouts
Sections
.text Size: 235KB - Virtual size: 235KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 66KB - Virtual size: 39.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.hepuh Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tub Size: 1024B - Virtual size: 624B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.yuduriy Size: 512B - Virtual size: 23B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.nilebi Size: 1024B - Virtual size: 963B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 69KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ