Static task
static1
Behavioral task
behavioral1
Sample
bd0a901de944a87bf6d156f474a5f2f45fcd52f66af417806a6ae29c38f22a4b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bd0a901de944a87bf6d156f474a5f2f45fcd52f66af417806a6ae29c38f22a4b.exe
Resource
win10v2004-20220901-en
General
-
Target
bd0a901de944a87bf6d156f474a5f2f45fcd52f66af417806a6ae29c38f22a4b
-
Size
98KB
-
MD5
82f6eb6fe09e3493a2a5d709dab720a0
-
SHA1
5097433876afbb9ba32e38406ad739816ad7c4bc
-
SHA256
bd0a901de944a87bf6d156f474a5f2f45fcd52f66af417806a6ae29c38f22a4b
-
SHA512
0c92c739bd5e8d6747acdfb993378d4641eb5276a3d8d6dfa7a337f5ffe0bb3d4eb1191039f075e252c896c3b4578326a18dc769563bb55b7e842b326cc12681
-
SSDEEP
3072:WFBqD6raxvfh82QSmfjdwt7Np3sZFA2OAYp:C0qAXpQSmfjOtH3yG2OZ
Malware Config
Signatures
Files
-
bd0a901de944a87bf6d156f474a5f2f45fcd52f66af417806a6ae29c38f22a4b.exe windows x86
34469644fa72d1702f174bd16e52133c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcessId
GetProcAddress
GetStdHandle
LoadLibraryA
CreateMutexA
GetSystemDirectoryA
GetCurrentProcess
GetWindowsDirectoryA
VirtualProtect
GetCurrentThreadId
GetVersionExA
LoadResource
FindResourceA
LocalFree
ExitProcess
GetCurrentThread
GetComputerNameA
VirtualAlloc
CreateEventA
LocalAlloc
LockResource
GetCurrentDirectoryA
advapi32
GetUserNameA
user32
GetForegroundWindow
GetActiveWindow
GetSystemMetrics
msvcrt
memcpy
memset
wcslen
wcsncpy
Sections
.text Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 14B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 65KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ