Static task
static1
Behavioral task
behavioral1
Sample
bee135644f6ec2cefd9d8fa38577118d727595c3b0d654e378400836a583453e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bee135644f6ec2cefd9d8fa38577118d727595c3b0d654e378400836a583453e.exe
Resource
win10v2004-20220901-en
General
-
Target
bee135644f6ec2cefd9d8fa38577118d727595c3b0d654e378400836a583453e
-
Size
467KB
-
MD5
670689fe3c2836e1e9627f3c9966f0a0
-
SHA1
51998fcc7236001dae384e67bacf28adc67a0dce
-
SHA256
bee135644f6ec2cefd9d8fa38577118d727595c3b0d654e378400836a583453e
-
SHA512
7e681fa205c82b60276839be2f2dc54677572b87555c3d6e71d390c1173ef746bb9139d0e730f2b4d286e93549a06317fab178129f8085e37eb713ad3a8a0260
-
SSDEEP
12288:XAdHZaSuitmbSU20f9fs3hzQSYvK91gzW3s:wdHxltmbSYfSNjrgzW3s
Malware Config
Signatures
Files
-
bee135644f6ec2cefd9d8fa38577118d727595c3b0d654e378400836a583453e.exe windows x86
2abdae6c80b902b47c9cd4a385768af0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FlushFileBuffers
DisconnectNamedPipe
WriteFile
ConnectNamedPipe
CreateSemaphoreA
PeekNamedPipe
GetOverlappedResult
GetModuleFileNameA
UnmapViewOfFile
GetFileSize
MapViewOfFile
CreateFileMappingA
ReadFile
Sleep
FindClose
FindNextFileA
FindFirstFileA
GetWindowsDirectoryA
GetSystemDirectoryA
GetComputerNameA
MultiByteToWideChar
GetVersionExA
WideCharToMultiByte
GetACP
GetDriveTypeA
FreeLibrary
LoadLibraryA
GetVersion
GetModuleHandleA
GetProcAddress
GetLastError
WaitForMultipleObjects
SetEvent
WaitForSingleObject
CreateEventA
DeviceIoControl
CloseHandle
CreateFileA
DeleteCriticalSection
CreateNamedPipeA
InterlockedIncrement
InterlockedCompareExchange
InterlockedDecrement
lstrlenA
SetFilePointer
SetEndOfFile
HeapAlloc
OutputDebugStringA
HeapFree
HeapCreate
HeapDestroy
EnterCriticalSection
LeaveCriticalSection
GetFileTime
SetFileTime
DeleteFileA
MoveFileA
GetCurrentThreadId
GetCurrentProcessId
GetTimeZoneInformation
GetTickCount
CreateDirectoryA
GetCurrentDirectoryA
SetCurrentDirectoryA
RemoveDirectoryA
GetComputerNameW
GetCurrentProcess
TerminateProcess
SetFileAttributesA
ExitThread
CreateThread
GetSystemTimeAsFileTime
DecodePointer
EncodePointer
GetCommandLineA
HeapSetInformation
GetStartupInfoW
GetTimeFormatA
GetDateFormatA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
SetLastError
ExitProcess
GetCPInfo
GetOEMCP
IsValidCodePage
LCMapStringW
GetStdHandle
GetModuleFileNameW
GetStringTypeW
HeapSize
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
QueryPerformanceCounter
IsProcessorFeaturePresent
RtlUnwind
LoadLibraryW
HeapReAlloc
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleW
CreateFileW
CompareStringW
SetEnvironmentVariableA
InitializeCriticalSection
user32
MapVirtualKeyExA
SetCursor
LoadStringA
DefWindowProcA
PostQuitMessage
DestroyWindow
DispatchMessageA
TranslateMessage
PeekMessageA
MsgWaitForMultipleObjects
CreateWindowExA
RegisterClassA
LoadCursorA
LoadIconA
GetForegroundWindow
MapVirtualKeyA
GetKeyboardLayout
EnumDisplaySettingsA
wsprintfA
wsprintfW
GetKeyNameTextA
gdi32
GetStockObject
advapi32
RegDeleteValueA
RegEnumValueA
RegEnumKeyExA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
GetUserNameA
RegSetValueExA
RegCreateKeyExA
RegDeleteKeyA
ole32
CoCreateInstance
CoUninitialize
CoInitialize
oleaut32
SysAllocStringLen
VariantClear
VariantInit
SysAllocString
SysStringLen
SysFreeString
shell32
SHGetPathFromIDListA
SHGetSpecialFolderLocation
SHGetMalloc
Sections
.text Size: 282KB - Virtual size: 282KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 149KB - Virtual size: 148KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 852B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ