Static task
static1
Behavioral task
behavioral1
Sample
bda83ef58b20aee6c488db8ce838e6b4cf42ba25d48a153677fed9886f927eca.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bda83ef58b20aee6c488db8ce838e6b4cf42ba25d48a153677fed9886f927eca.exe
Resource
win10v2004-20220812-en
General
-
Target
bda83ef58b20aee6c488db8ce838e6b4cf42ba25d48a153677fed9886f927eca
-
Size
1.5MB
-
MD5
9d60f62b8b1b6b062dcf2a327b55522d
-
SHA1
077b84c3199c0b4350aafeeefbe2e10f0aaa408a
-
SHA256
bda83ef58b20aee6c488db8ce838e6b4cf42ba25d48a153677fed9886f927eca
-
SHA512
5421edc8db824ef573e167c1fbebdb72dbd4f49ad03883cb50ee471850a4c9f12113f011027b93ec8529f741dcd4b7eafe8741cc6784cd720ff5608e1e5c8ed3
-
SSDEEP
24576:VqRTZW+grVQQb7tIwNI5bBUD5aMqfg0p2TdCQ2STacyDjOubnISmOF8W28u8W+z8:V9JQQbRM51Y5Sg1cQ2STHWZmOF2x8XY
Malware Config
Signatures
Files
-
bda83ef58b20aee6c488db8ce838e6b4cf42ba25d48a153677fed9886f927eca.exe windows x86
a994a064929b9db82b57c05917f6f216
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
SelectObject
GetDeviceCaps
DeleteObject
SetBkColor
CreateCompatibleBitmap
kernel32
GetCommandLineA
GetCurrentThreadId
GetModuleHandleA
GetCurrentProcessId
GetLastError
GetCurrentThread
GetTickCount
ExitProcess
HeapAlloc
GetProcessHeap
VirtualAlloc
FindResourceA
Sleep
VirtualFree
UnmapViewOfFile
IsValidCodePage
CreateProcessA
SizeofResource
InterlockedExchange
GetModuleHandleW
CloseHandle
ReadFile
RaiseException
HeapSize
WideCharToMultiByte
GetCommandLineW
LockResource
GetEnvironmentStrings
GetShortPathNameA
lstrlenW
GlobalUnlock
GetThreadLocale
LCMapStringA
lstrlenA
GetSystemInfo
HeapCreate
LCMapStringW
LeaveCriticalSection
CreateFileA
GetFileType
CreateEventA
CreateFileW
CreateEventW
RemoveDirectoryA
GlobalLock
FindFirstFileW
CompareStringA
FindFirstFileA
GetProcAddress
DeleteFileW
GetFileSize
GetStartupInfoA
LoadLibraryA
GetVersionExA
TlsAlloc
QueryPerformanceCounter
SetEvent
LoadLibraryW
SetHandleCount
EnterCriticalSection
HeapFree
WriteConsoleW
InterlockedIncrement
SetEndOfFile
VirtualQuery
TerminateProcess
SetEnvironmentVariableA
MulDiv
SetUnhandledExceptionFilter
MultiByteToWideChar
UnhandledExceptionFilter
GetModuleFileNameA
FlushFileBuffers
IsDebuggerPresent
GetModuleFileNameW
SetLastError
FormatMessageA
TlsGetValue
FindClose
LoadResource
GetExitCodeProcess
LocalFree
FreeLibrary
GetStringTypeW
HeapReAlloc
GetSystemTimeAsFileTime
WriteFile
GetStringTypeA
GetCPInfo
SetStdHandle
FreeEnvironmentStringsW
GetConsoleMode
GetCurrentProcess
DeleteCriticalSection
FreeEnvironmentStringsA
GetFileAttributesW
HeapDestroy
WaitForSingleObject
GetFileAttributesA
FileTimeToSystemTime
GetStdHandle
user32
ScreenToClient
EndDialog
SetWindowLongA
GetWindowRect
GetSystemMetrics
DefWindowProcA
FillRect
SetTimer
LoadCursorA
ShowWindow
GetParent
DestroyWindow
SendMessageA
GetCursorPos
EndPaint
SetWindowPos
LoadIconA
MessageBoxA
IsWindowVisible
TranslateMessage
InvalidateRect
oleaut32
SysAllocStringLen
SysStringLen
VariantClear
SysAllocString
Sections
.text Size: 1.5MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ