Static task
static1
Behavioral task
behavioral1
Sample
bd0ea3e6ed4f1e77a31c9e9a59aedc623f48b6b50834b2df70f2b375a4650153.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
bd0ea3e6ed4f1e77a31c9e9a59aedc623f48b6b50834b2df70f2b375a4650153.exe
Resource
win10v2004-20220812-en
General
-
Target
bd0ea3e6ed4f1e77a31c9e9a59aedc623f48b6b50834b2df70f2b375a4650153
-
Size
6.3MB
-
MD5
34aabe8df424d6626452bd4de2ac13cc
-
SHA1
1a72b982397b803f26a7a4e755754afa1b0c48c3
-
SHA256
bd0ea3e6ed4f1e77a31c9e9a59aedc623f48b6b50834b2df70f2b375a4650153
-
SHA512
dc61610cab0dfcc46f4027030a5c4d155794c0b1acd3c2cb62273196332ef30022c488fb7a9de45b5a68c705a7bd401819dd6120a62479dea02285c0156721ae
-
SSDEEP
196608:Py8GWfaxiBX02HaHlwdo0fhHVlq5n4cwz+zQp79DnNhfWSxjl:a8GQzV6HlCo+1VEtlE9Dmap
Malware Config
Signatures
Files
-
bd0ea3e6ed4f1e77a31c9e9a59aedc623f48b6b50834b2df70f2b375a4650153.exe windows x86
ea400d86c5bc4fdd88a0e3d1730cdfc0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileSize
GetFileTime
SetErrorMode
GlobalFlags
GetProcessVersion
WritePrivateProfileStringA
SizeofResource
GetCPInfo
GetOEMCP
FileTimeToSystemTime
FileTimeToLocalFileTime
LocalReAlloc
TlsGetValue
GetLocalTime
ExitProcess
GetStartupInfoA
GetCommandLineA
HeapAlloc
HeapFree
HeapReAlloc
CreateThread
ExitThread
RaiseException
HeapSize
GetACP
UnhandledExceptionFilter
GetTimeZoneInformation
TlsSetValue
RtlUnwind
GlobalReAlloc
DuplicateHandle
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
SetStdHandle
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
_lopen
FindFirstFileA
TlsFree
GlobalHandle
TlsAlloc
LocalAlloc
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
LocalFree
MulDiv
SetLastError
FreeLibrary
GetVersion
lstrcatA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GetModuleHandleA
GlobalUnlock
GlobalFree
LockResource
FindResourceA
LoadResource
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
GetCurrentThread
lstrcmpiA
GetFullPathNameA
lstrcpynA
GetVolumeInformationA
lstrcpyA
LoadLibraryA
GetProcAddress
UnlockFile
LockFile
WriteFile
FindClose
FlushFileBuffers
SetFilePointer
GetCurrentProcess
DeleteFileA
ReadFile
CreateFileA
GetEnvironmentStrings
GetLastError
GetModuleFileNameA
CreateEventA
SuspendThread
GetCurrentThreadId
SetThreadPriority
ResumeThread
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
InterlockedDecrement
InterlockedIncrement
SetEndOfFile
GetSystemTime
WaitForSingleObject
SetEvent
_lwrite
_lread
_llseek
_lclose
GetEnvironmentStringsW
SetHandleCount
FreeEnvironmentStringsA
FreeEnvironmentStringsW
CreateDirectoryA
OpenProcess
SetFileAttributesA
Sleep
SetCurrentDirectoryA
TerminateProcess
GetProfileStringA
GetCurrentDirectoryA
CloseHandle
CreateProcessA
GetFileAttributesA
user32
GetDC
IsDialogMessageA
SetWindowTextA
ShowWindow
ClientToScreen
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
LoadCursorA
GetSysColorBrush
GetClassNameA
PtInRect
GetWindowDC
DestroyMenu
InflateRect
InvalidateRect
GetTopWindow
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetWindowTextLengthA
MapWindowPoints
DefWindowProcA
CreateWindowExA
SendDlgItemMessageA
ReleaseDC
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
OffsetRect
GetWindowPlacement
EndDialog
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetDlgItem
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
SetCursor
PostQuitMessage
PostMessageA
CharUpperA
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
LoadStringA
EnableWindow
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
GetWindowRect
UpdateWindow
SetTimer
AdjustWindowRectEx
ScreenToClient
CopyRect
GetSysColor
SetFocus
SetPropA
UnhookWindowsHookEx
GetWindowTextA
GetDlgCtrlID
GetClassLongA
LoadIconA
FindWindowA
GetWindowThreadProcessId
MessageBoxA
wsprintfA
SendMessageA
SystemParametersInfoA
IntersectRect
IsWindow
GetWindow
DefDlgProcA
DrawFocusRect
IsWindowUnicode
ShowCaret
UnregisterClassA
HideCaret
CharNextA
ExcludeUpdateRgn
gdi32
SetTextColor
SetBkColor
GetObjectA
PatBlt
DeleteDC
SaveDC
RestoreDC
SelectObject
GetStockObject
SetBkMode
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
IntersectClipRect
CreateBitmap
GetClipBox
DeleteObject
GetDeviceCaps
CreateSolidBrush
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
CreateDIBitmap
CreateCompatibleDC
BitBlt
GetTextExtentPointA
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
shell32
SHBrowseForFolderA
SHGetPathFromIDListA
comctl32
ord17
Sections
.text Size: 156KB - Virtual size: 152KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ