Static task
static1
Behavioral task
behavioral1
Sample
bfdac82979537985b490258fb70febdb94c3f4f6628d8ab16826eae3991bc925.exe
Resource
win10-20220414-en
General
-
Target
bfdac82979537985b490258fb70febdb94c3f4f6628d8ab16826eae3991bc925
-
Size
308KB
-
MD5
2841b7ce1412fa3c2c1049d6e338adba
-
SHA1
f6446ce732b57e17454311474916b2d3a6affaf9
-
SHA256
bfdac82979537985b490258fb70febdb94c3f4f6628d8ab16826eae3991bc925
-
SHA512
02613e1700308df77b901c39c1f0635683d16b5fc29e23ac6bf72d275e09a80bde17b0d47cb77eb7a6c1992c11aa4e60a50efd990b46b881f77f567536e9a9ec
-
SSDEEP
6144:Hm6GQJbs3qi5640o3sp3plTLk2tvtbUHOCui6nXAAtXFCj:Hm6DNs6w70o8p5lvk0VAOCuiM8j
Malware Config
Signatures
Files
-
bfdac82979537985b490258fb70febdb94c3f4f6628d8ab16826eae3991bc925.exe windows x86
d678c14acaa4919994638bfe24403847
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcatA
FindFirstChangeNotificationA
GetNamedPipeHandleStateW
GetOverlappedResult
FillConsoleOutputCharacterW
GetQueuedCompletionStatus
TerminateProcess
GetCurrentProcessId
FindNextFileA
CopyFileExA
BuildCommDCBAndTimeoutsA
EnumDateFormatsA
GetVersionExW
VirtualLock
WriteProfileStringW
VerifyVersionInfoA
GetProcessPriorityBoost
GetPriorityClass
GetCompressedFileSizeW
FindNextVolumeMountPointW
OutputDebugStringW
GetWriteWatch
WriteConsoleInputA
GetConsoleTitleA
SetComputerNameExW
GetTimeZoneInformation
LoadLibraryW
GetSystemDirectoryW
GetDriveTypeA
GetModuleHandleA
GlobalAlloc
GetShortPathNameA
ZombifyActCtx
GetProfileSectionA
DeleteFileW
GetCommandLineW
ReadConsoleOutputCharacterA
GetCalendarInfoW
ReleaseActCtx
FindResourceA
FormatMessageW
GetModuleFileNameA
CreateJobObjectW
EnterCriticalSection
SetFirmwareEnvironmentVariableA
GetDllDirectoryA
GetExitCodeThread
LoadLibraryA
WritePrivateProfileStringA
GetConsoleAliasesLengthW
WriteProfileSectionA
InterlockedDecrement
AddAtomW
UpdateResourceW
GetVersionExA
InterlockedExchangeAdd
GetStartupInfoW
ConnectNamedPipe
GetConsoleAliasExesW
DebugBreak
EndUpdateResourceA
GetLastError
GetSystemWindowsDirectoryW
GetSystemWow64DirectoryW
GetCPInfoExA
GetStringTypeExW
DeleteVolumeMountPointA
FatalAppExitA
SetSystemTime
OpenFileMappingW
lstrcmpA
SetConsoleCursorPosition
SetDefaultCommConfigW
GetACP
GetCurrencyFormatA
CreateActCtxW
GetTapeParameters
GetMailslotInfo
GetConsoleAliasW
_lwrite
GetDiskFreeSpaceExA
DefineDosDeviceW
GetAtomNameA
FlushConsoleInputBuffer
EnumResourceTypesA
lstrlenW
GetLongPathNameW
CreateJobSet
WriteConsoleW
VirtualProtect
ReadConsoleOutputW
SuspendThread
BuildCommDCBW
FoldStringA
GetHandleInformation
GetComputerNameW
WritePrivateProfileSectionA
WritePrivateProfileStructA
TryEnterCriticalSection
GetPrivateProfileSectionNamesA
CopyFileW
MoveFileA
GetVolumePathNameA
SetConsoleMode
HeapWalk
FindNextFileW
ResetEvent
ReadProcessMemory
MoveFileExW
GetVersion
ChangeTimerQueueTimer
WriteConsoleInputW
InterlockedCompareExchange
GetCommMask
SetFileShortNameA
lstrcpyW
VerLanguageNameA
FreeEnvironmentStringsA
EnumDateFormatsExW
GetProfileStringA
GlobalGetAtomNameW
GetConsoleAliasesA
CreateMailslotW
SetConsoleOutputCP
MoveFileWithProgressW
GetFileInformationByHandle
GetLocalTime
FoldStringW
CallNamedPipeW
GetConsoleAliasExesLengthA
OpenSemaphoreW
GetPrivateProfileIntA
GetModuleHandleExW
WriteConsoleOutputCharacterW
SetComputerNameW
FindActCtxSectionStringW
GetTickCount
FreeLibraryAndExitThread
_hwrite
GetUserDefaultLangID
LocalLock
FindFirstVolumeW
FindClose
OpenWaitableTimerA
EnumResourceNamesA
OpenFileMappingA
GetFileType
QueueUserWorkItem
RaiseException
lstrcpynA
GetFullPathNameA
SetThreadPriority
ReadConsoleA
AssignProcessToJobObject
CreateFileW
GetDateFormatA
DeactivateActCtx
SetCurrentDirectoryW
GetFileAttributesA
GetBinaryTypeW
SetCalendarInfoA
InterlockedIncrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleFileNameW
RtlUnwind
HeapValidate
IsBadReadPtr
GetProcAddress
TlsGetValue
GetModuleHandleW
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
SetLastError
GetStdHandle
WriteFile
OutputDebugStringA
ExitProcess
QueryPerformanceCounter
GetSystemTimeAsFileTime
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStartupInfoA
HeapDestroy
HeapCreate
HeapFree
VirtualFree
FlushFileBuffers
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
GetOEMCP
GetCPInfo
IsValidCodePage
InitializeCriticalSectionAndSpinCount
MultiByteToWideChar
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
SetFilePointer
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
ReadFile
CloseHandle
CreateFileA
DeleteFileA
Sections
.text Size: 220KB - Virtual size: 219KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 69KB - Virtual size: 711KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pepime Size: 512B - Virtual size: 5B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.nax Size: 512B - Virtual size: 75B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.xipeley Size: 512B - Virtual size: 34B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ