Behavioral task
behavioral1
Sample
3dee02960c8e168c7fbe7b1844413d1a6f6d75e2ea7045ec55d529396cbf42e3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3dee02960c8e168c7fbe7b1844413d1a6f6d75e2ea7045ec55d529396cbf42e3.exe
Resource
win10v2004-20220812-en
General
-
Target
3dee02960c8e168c7fbe7b1844413d1a6f6d75e2ea7045ec55d529396cbf42e3.bin
-
Size
37KB
-
MD5
09ea99786071b7bfd5720a26e479e198
-
SHA1
27d217be79c8c9b10af665319c9920d1b0227a50
-
SHA256
3dee02960c8e168c7fbe7b1844413d1a6f6d75e2ea7045ec55d529396cbf42e3
-
SHA512
2dbb269f47a04262dbda6943cf3a9b2d93620d139b57f0cb60867f27fef9cf5f4c78bdc2b37a807218d136018cf2da20647294307685e9d5a3ecd371cdc7fb9f
-
SSDEEP
768:Q925ZmU0HaLCMH0UG/mjEOiuXY02jqFN0:Q92nXL3uI1A
Malware Config
Extracted
bughatch
https://38.135.122.130
https://64.235.39.82
Signatures
-
Bughatch family
Files
-
3dee02960c8e168c7fbe7b1844413d1a6f6d75e2ea7045ec55d529396cbf42e3.bin.exe windows x86
ad05059a9651b1dfe4e31aa4ffc15cd1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetOpenA
InternetCloseHandle
InternetCrackUrlA
HttpQueryInfoA
HttpSendRequestA
HttpOpenRequestA
InternetSetOptionA
InternetQueryOptionA
InternetReadFile
InternetConnectA
iphlpapi
GetAdaptersAddresses
GetIpAddrTable
shlwapi
StrChrW
wnsprintfW
ws2_32
ntohl
userenv
DestroyEnvironmentBlock
CreateEnvironmentBlock
kernel32
GetModuleHandleW
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
CreateFileA
GetWindowsDirectoryA
GetTempPathA
GetProcAddress
OpenProcess
GetCurrentProcess
CreateThread
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
SetEvent
WaitForSingleObject
CloseHandle
GetSystemInfo
lstrcpyA
lstrcpyW
lstrcatA
lstrcatW
lstrlenA
lstrlenW
CreateEventA
GetModuleFileNameW
GetModuleHandleA
GetComputerNameW
QueryPerformanceCounter
GetVersionExW
MultiByteToWideChar
WideCharToMultiByte
GetCurrentProcessId
ExitProcess
Sleep
GetVolumeInformationA
HeapAlloc
HeapFree
GetProcessHeap
FlushInstructionCache
VirtualAlloc
VirtualAllocEx
TerminateProcess
CreateRemoteThread
GetLastError
WriteProcessMemory
GetThreadContext
SetThreadContext
ResumeThread
WriteFile
ReadFile
SetHandleInformation
GetTickCount
CreatePipe
PeekNamedPipe
lstrcmpiW
GetModuleFileNameA
CreateProcessA
GetStartupInfoA
GetCommandLineW
GetEnvironmentVariableA
user32
wsprintfA
advapi32
AllocateAndInitializeSid
CheckTokenMembership
DuplicateTokenEx
CreateProcessAsUserW
LogonUserW
LookupPrivilegeValueA
FreeSid
OpenProcessToken
AdjustTokenPrivileges
LookupAccountSidW
GetTokenInformation
Sections
.text Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 768B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ