Static task
static1
Behavioral task
behavioral1
Sample
bcf5897500abb75c99555228542d989d003a192c2fc7fdf3eb32074c1ecacca0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bcf5897500abb75c99555228542d989d003a192c2fc7fdf3eb32074c1ecacca0.exe
Resource
win10v2004-20220812-en
General
-
Target
bcf5897500abb75c99555228542d989d003a192c2fc7fdf3eb32074c1ecacca0
-
Size
100KB
-
MD5
82a6482e058ee4b738cea9639fa996ad
-
SHA1
1b2a1027ae2441c41d74716ca7ff5bbbcd4b1b07
-
SHA256
bcf5897500abb75c99555228542d989d003a192c2fc7fdf3eb32074c1ecacca0
-
SHA512
d9d77c8b98c00873a076d75553de01a5f0c841b4fded9f874f18896fa757d7632cfa81947a6ae4437ea4bb8a46071a6e38b52616aae57ea4c27c0ebabe7f54ed
-
SSDEEP
1536:E2kMILaYSNgZmXXxRWllbahcrJIUBjiNGs9MJLpZdQQofak2kUheLvTq7QtmoYtQ:vqbT5lheLvTQoYiIGrU5Ogs0ozj
Malware Config
Signatures
Files
-
bcf5897500abb75c99555228542d989d003a192c2fc7fdf3eb32074c1ecacca0.exe windows x86
bab34e51f851a7d84fc81b061228bfb3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileType
CreateThread
GetCurrentThreadId
ResumeThread
SetThreadPriority
ExitThread
TerminateThread
MultiByteToWideChar
UnmapViewOfFile
MapViewOfFile
SetCurrentDirectoryA
ExitProcess
FindFirstFileW
FindNextFileW
FindClose
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
CreateFileA
ReadFile
WriteFile
CloseHandle
IsDebuggerPresent
FindFirstFileA
FindNextFileA
FindResourceA
LoadResource
SizeofResource
FreeResource
GetCommandLineW
SetFileAttributesW
WaitForMultipleObjects
GetCurrentProcess
CreateMutexA
ReleaseMutex
OpenMutexA
DeviceIoControl
InterlockedCompareExchange
EnumCalendarInfoA
LoadLibraryA
GetProcAddress
FileTimeToLocalFileTime
GetStringTypeW
lstrcmpiW
SetLastError
CreateFileW
GetFileSize
SetEndOfFile
CompareFileTime
DeleteFileW
GetCPInfo
GlobalHandle
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetVersionExA
GetExitCodeProcess
CreateEventA
SetEvent
ResetEvent
HeapAlloc
HeapCreate
HeapDestroy
GetProcessHeap
HeapReAlloc
HeapSize
HeapFree
GetCurrentThread
lstrcmpA
GlobalFree
GetFileAttributesW
LocalFileTimeToFileTime
SetThreadLocale
CompareStringA
CreateEventW
GetDateFormatA
GetStringTypeA
InterlockedIncrement
IsValidCodePage
InterlockedExchange
GetSystemDefaultLCID
GetExitCodeThread
GlobalLock
GetModuleHandleA
lstrlenA
VirtualQuery
FindResourceW
GlobalAlloc
GetACP
GetTempPathA
ExpandEnvironmentStringsA
SetStdHandle
GlobalReAlloc
LockResource
GetVersionExW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
DisableThreadLibraryCalls
InterlockedDecrement
GetConsoleOutputCP
GetOEMCP
GetSystemTimeAsFileTime
FreeEnvironmentStringsW
GetModuleFileNameA
FlushFileBuffers
GetStdHandle
GetTempFileNameA
GetStartupInfoW
TerminateProcess
GetEnvironmentStringsW
GetLastError
SetUnhandledExceptionFilter
GetShortPathNameA
LoadLibraryW
LoadLibraryExA
CreateProcessA
SetErrorMode
GetSystemDirectoryA
SetFilePointer
GetSystemTime
IsBadReadPtr
GetCommandLineA
QueryPerformanceCounter
lstrcmpiA
GetCurrentProcessId
SystemTimeToFileTime
GetLocaleInfoA
GlobalUnlock
lstrcpynA
WaitForSingleObject
GetPrivateProfileStringA
GetModuleFileNameW
lstrcpyA
MoveFileA
FileTimeToSystemTime
GetDiskFreeSpaceA
CopyFileA
GetDriveTypeA
RaiseException
GetConsoleMode
GetStartupInfoA
LoadLibraryExW
GetTickCount
GetLocalTime
LCMapStringW
GetTempPathW
LocalAlloc
VirtualAlloc
msvcrt
strchr
strncat
_stricmp
strlen
calloc
wcscmp
__badioinfo
_exit
wcstoul
_write
towlower
_mktemp
_close
_osver
strcpy
_CIpow
setlocale
_strdup
sqrt
_umask
_wcslwr
_mbscmp
malloc
fsetpos
time
memcpy
srand
bsearch
_strcmpi
_setmode
_stat
__p__environ
strcmp
fclose
__p__fmode
_getpid
_onexit
strstr
_adjust_fdiv
sin
_wtol
strspn
gmtime
_unlock
__pioinfo
swscanf
_assert
memchr
_strnicmp
localtime
strncpy
_ftol
floor
abort
isspace
free
wctomb
printf
_open
atol
strrchr
_fullpath
_ultoa
log
rewind
_CIsqrt
_except_handler3
fread
_beginthreadex
fopen
signal
exit
_wfopen
isleadbyte
getenv
__p___initenv
rename
_filbuf
sprintf
_flsbuf
fprintf
wcstombs
_dup2
_snprintf
_controlfp
toupper
putchar
clock
realloc
_chmod
wcscspn
_snwprintf
_iob
fgetpos
_dup
wcslen
_filelengthi64
ceil
wcschr
fputs
_itoa
_ismbblead
_wcsupr
__initenv
_open_osfhandle
_getch
vsprintf
_fdopen
_kbhit
clearerr
strpbrk
_amsg_exit
iswspace
_wcsicmp
fgetc
wcsncmp
strtol
strncmp
__dllonexit
ungetc
strcat
wcsrchr
_getcwd
_initterm
_read
__lc_codepage
_strlwr
iswdigit
_purecall
rand
__p__commode
_vsnprintf
swprintf
_fileno
_get_osfhandle
ftell
_errno
_mbsicmp
_wtoi
wcstol
__mb_cur_max
isdigit
fflush
localeconv
fseek
_setjmp
tolower
strtok
_mkdir
wcsstr
cos
_setjmp3
fgets
__setusermatherr
ctime
atof
towupper
strtoul
_lseek
remove
_c_exit
strerror
isxdigit
fputc
_lock
_pctype
memmove
__getmainargs
_isatty
iswctype
_isctype
_putenv
_lseeki64
wcsncpy
atoi
__set_app_type
_wcsnicmp
atexit
pow
longjmp
_mbsrchr
_utime
puts
_itow
sscanf
strcspn
_unlink
_acmdln
perror
fwrite
memcmp
qsort
_cexit
user32
CheckMenuItem
EnumWindows
GetMenuItemID
UpdateWindow
IsWindowEnabled
SendMessageA
GetCursorPos
DrawTextA
ClientToScreen
CharNextA
DrawIconEx
GetScrollRange
DialogBoxParamA
GetScrollPos
GetWindowLongA
SetForegroundWindow
MapWindowPoints
IsZoomed
wsprintfA
GetParent
SetRect
RegisterClassA
FindWindowA
DestroyWindow
CreateWindowExA
InsertMenuItemA
SetMenu
UnhookWindowsHookEx
SetWindowsHookExA
EnumThreadWindows
SetFocus
GetWindow
OemToCharA
UnregisterClassA
GetIconInfo
CharLowerA
SendDlgItemMessageA
BeginPaint
LoadCursorA
FrameRect
GetWindowRect
GetKeyState
ShowOwnedPopups
TranslateMessage
TrackPopupMenu
DrawFrameControl
InflateRect
GetMenuItemCount
IsRectEmpty
EmptyClipboard
EnableMenuItem
KillTimer
SetScrollPos
SetScrollRange
GetFocus
GetMenuStringA
SetPropA
ScrollWindow
RegisterWindowMessageA
EndPaint
ShowWindow
InsertMenuA
SetTimer
SetScrollInfo
GetPropA
GetSystemMetrics
FillRect
SetCapture
CallWindowProcA
GetScrollInfo
GetLastActivePopup
GetClassNameA
OffsetRect
GetWindowPlacement
EqualRect
SystemParametersInfoA
GetDesktopWindow
SetCursor
CloseClipboard
GetSubMenu
DeleteMenu
GetSystemMenu
DestroyCursor
CreateMenu
GetWindowTextA
RedrawWindow
SetClassLongA
IsWindow
GetSysColorBrush
RegisterClipboardFormatA
SetActiveWindow
SetClipboardData
RemoveMenu
GetDlgItem
PtInRect
GetActiveWindow
IntersectRect
EndDialog
DispatchMessageA
GetTopWindow
IsWindowVisible
EnableWindow
RemovePropA
ReleaseDC
GetDC
CreatePopupMenu
GetMessagePos
GetClientRect
DrawMenuBar
GetForegroundWindow
IsIconic
ShowCursor
SetWindowPos
DrawIcon
OpenClipboard
IsDialogMessageA
GetSysColor
SetWindowTextA
GetClassInfoA
GetMessageA
MessageBeep
PostQuitMessage
LoadBitmapA
InvalidateRect
GetKeyboardType
PostMessageA
ReleaseCapture
DestroyIcon
SetWindowLongA
GetDCEx
GetWindowThreadProcessId
DrawEdge
PeekMessageA
DefWindowProcA
GetCapture
SetWindowPlacement
ScreenToClient
AdjustWindowRectEx
DestroyMenu
LoadIconA
Sections
.text Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ