Static task
static1
Behavioral task
behavioral1
Sample
badfa9e528512068b7e9739e38e4a138a8ebd1164e31c59dac1a7b568752b63a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
badfa9e528512068b7e9739e38e4a138a8ebd1164e31c59dac1a7b568752b63a.exe
Resource
win10v2004-20220901-en
General
-
Target
badfa9e528512068b7e9739e38e4a138a8ebd1164e31c59dac1a7b568752b63a
-
Size
837KB
-
MD5
6edbf19021ec69985410e06df0f49890
-
SHA1
219ee10abf6b95af9cb95b9c443987bc535052b7
-
SHA256
badfa9e528512068b7e9739e38e4a138a8ebd1164e31c59dac1a7b568752b63a
-
SHA512
31afeef8f2d9ffb58eae3fb690a3d80de54aac9592a62c94740b65694050e2a30b85348b22821e80717f89f5f7f8bc791cf271a99dbfddd5299e081b55e3bd48
-
SSDEEP
24576:nNoqrsOLeN4SK85oMjLBWRjnyBGu7T8ivNhcpJ:NoqZE4ST/jLI6D3Jvj
Malware Config
Signatures
Files
-
badfa9e528512068b7e9739e38e4a138a8ebd1164e31c59dac1a7b568752b63a.exe windows x86
334fdc05b994497f4f795c9362d46408
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeEnvironmentStringsW
GetPrivateProfileStringA
GetModuleFileNameW
GlobalAlloc
GlobalReAlloc
Process32Next
CompareStringW
GetProcessHeap
GetModuleHandleA
InitializeCriticalSectionAndSpinCount
InterlockedDecrement
GetWindowsDirectoryA
GetVersionExA
GetFileSizeEx
QueryPerformanceCounter
GlobalGetAtomNameA
DuplicateHandle
GetCommandLineA
LCMapStringW
Process32First
SetStdHandle
InitializeCriticalSection
GetSystemInfo
CompareStringA
FreeLibrary
GetCPInfo
EnumResourceLanguagesA
GetSystemTimeAsFileTime
GetStringTypeW
WaitForSingleObject
VirtualFree
GetLocalTime
GlobalFlags
SetHandleCount
GetFileAttributesA
GetPrivateProfileIntA
FormatMessageA
HeapAlloc
GetProcAddress
SetUnhandledExceptionFilter
InterlockedExchange
HeapCreate
FileTimeToLocalFileTime
TerminateProcess
LockFile
FreeResource
ExitProcess
TlsAlloc
TerminateThread
MultiByteToWideChar
SetCurrentDirectoryA
FreeEnvironmentStringsA
GlobalAddAtomA
WritePrivateProfileStringA
GetCurrentDirectoryA
HeapFree
GetCurrentProcess
SetErrorMode
GetCurrentProcessId
GetSystemDefaultLangID
GetEnvironmentStringsW
GetOEMCP
LockResource
TlsFree
CloseHandle
RtlUnwind
LocalAlloc
HeapSize
LoadResource
FindClose
FindNextFileA
EnterCriticalSection
DeleteCriticalSection
GetVolumeInformationA
GetThreadLocale
GetConsoleCP
RemoveDirectoryA
VirtualAlloc
LocalFree
lstrcmpW
SetEndOfFile
LeaveCriticalSection
lstrcmpA
GetLocaleInfoA
InterlockedIncrement
IsDebuggerPresent
CreateThread
LCMapStringA
SetEnvironmentVariableA
FlushFileBuffers
GetFullPathNameA
GetStringTypeA
GetConsoleOutputCP
WriteConsoleW
TlsSetValue
GetFileType
LocalReAlloc
lstrlenA
CreateToolhelp32Snapshot
CreateDirectoryA
UnlockFile
GetCurrentThread
GlobalFindAtomA
UnhandledExceptionFilter
SetFilePointer
SetLastError
RaiseException
GetStdHandle
WriteConsoleA
OpenProcess
GlobalFree
WinExec
WideCharToMultiByte
GetConsoleMode
WriteFile
Sleep
GetLastError
SizeofResource
ConvertDefaultLocale
GlobalDeleteAtom
TlsGetValue
HeapReAlloc
GetEnvironmentStrings
GetACP
MulDiv
GetFileSize
GlobalHandle
GetPrivateProfileSectionA
ReadConsoleA
GetTimeZoneInformation
GetTickCount
GlobalLock
ReadFile
IsValidCodePage
FindFirstFileA
VirtualQuery
CreateFileA
GlobalUnlock
GetModuleHandleW
FindResourceA
FileTimeToSystemTime
LoadLibraryA
GetModuleFileNameA
GetStartupInfoA
DeleteFileA
CopyFileA
GetCurrentThreadId
GetDriveTypeA
GetFileTime
user32
IsWindow
GetMenuItemID
CallWindowProcA
GetClassInfoExA
MapDialogRect
PtInRect
SetWindowTextA
SendMessageA
CharUpperA
GetMenuState
SetWindowPos
GetMenuItemCount
GetSubMenu
GetParent
SetWindowsHookExA
ShowScrollBar
CopyRect
GetActiveWindow
SetCursor
IntersectRect
FillRect
GetClassNameA
ModifyMenuA
CharNextA
CallNextHookEx
RemovePropA
PostThreadMessageA
ReleaseDC
GetSysColor
LoadCursorA
DefWindowProcA
GetCapture
MessageBoxA
IsWindowEnabled
PostQuitMessage
GetCursorPos
GetMessageTime
GetMenuCheckMarkDimensions
IsDialogMessageA
GetWindowLongA
GetTopWindow
EnableMenuItem
PostMessageA
SetFocus
GetSystemMetrics
GetDlgItem
GetClientRect
SetMenuItemBitmaps
OffsetRect
GetDesktopWindow
InvalidateRgn
PeekMessageA
GetMessagePos
GetWindowPlacement
GetWindowThreadProcessId
TranslateMessage
IsChild
GetDC
GetWindow
BeginPaint
LoadBitmapA
DrawFocusRect
WinHelpA
SendDlgItemMessageA
SystemParametersInfoA
RedrawWindow
SetRect
UnhookWindowsHookEx
EndPaint
DispatchMessageA
GetWindowDC
GetDlgCtrlID
ShowWindow
UnregisterClassA
RegisterClassA
TabbedTextOutA
ReleaseCapture
DestroyMenu
RegisterWindowMessageA
ClientToScreen
MapWindowPoints
GetWindowTextA
UpdateWindow
GetNextDlgTabItem
ValidateRect
GetMessageA
CreateWindowExA
GetMenu
IsWindowVisible
SetPropA
LoadIconA
SetWindowContextHelpId
GetWindowTextLengthA
GetClassLongA
GetKeyState
CopyAcceleratorTableA
InvalidateRect
DestroyWindow
GetLastActivePopup
DrawTextExA
GrayStringA
RegisterClipboardFormatA
MoveWindow
GetForegroundWindow
GetNextDlgGroupItem
EqualRect
CreateDialogIndirectParamA
SetMenu
SetForegroundWindow
IsRectEmpty
IsIconic
ExitWindowsEx
GetWindowRect
GetSysColorBrush
TrackPopupMenu
GetPropA
CheckMenuItem
SetWindowLongA
EndDialog
SetActiveWindow
AdjustWindowRectEx
SetCapture
DrawTextA
GetFocus
GetClassInfoA
MessageBeep
EnableWindow
LoadMenuA
gdi32
CreateRectRgn
CreateRectRgnIndirect
DeleteDC
SelectClipRgn
SetWindowOrgEx
PtVisible
SaveDC
ExtTextOutA
CreateCompatibleDC
GetStockObject
CreateICA
SetViewportOrgEx
ExtSelectClipRgn
SetViewportExtEx
GetRgnBox
ScaleViewportExtEx
GetTextColor
RestoreDC
CreateCompatibleBitmap
Escape
CreateBitmap
OffsetViewportOrgEx
SelectObject
GetTextMetricsA
GetWindowExtEx
TextOutA
SetWindowExtEx
GetClipBox
GetMapMode
DeleteObject
RectVisible
SetMapMode
GetTextExtentPoint32A
ScaleWindowExtEx
SetBkMode
SetBkColor
CreateSolidBrush
GetDeviceCaps
SetTextColor
GetViewportExtEx
GetObjectA
GetBkColor
BitBlt
advapi32
OpenServiceA
OpenSCManagerA
ControlService
RegCloseKey
RegDeleteKeyA
RegQueryValueA
RegEnumKeyA
RegSetValueExA
AdjustTokenPrivileges
RegOpenKeyExA
RegOpenKeyA
LookupPrivilegeValueA
RegQueryValueExA
RegCreateKeyExA
RegCreateKeyA
QueryServiceStatus
OpenProcessToken
shell32
SHGetFileInfoA
Shell_NotifyIconA
ole32
CLSIDFromProgID
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CLSIDFromString
CoTaskMemAlloc
OleInitialize
CoGetClassObject
OleIsCurrentClipboard
CoRevokeClassObject
CoRegisterMessageFilter
CoTaskMemFree
OleFlushClipboard
CreateILockBytesOnHGlobal
CoFreeUnusedLibraries
OleUninitialize
oleaut32
OleCreateFontIndirect
SysFreeString
SafeArrayDestroy
SystemTimeToVariantTime
VariantCopy
SysStringLen
VariantChangeType
VariantTimeToSystemTime
VariantClear
SysAllocString
SysAllocStringLen
SysAllocStringByteLen
VariantInit
winmm
DefDriverProc
wininet
FtpGetFileA
InternetSetStatusCallback
InternetCloseHandle
FtpSetCurrentDirectoryA
InternetGetLastResponseInfoA
InternetOpenA
InternetConnectA
oledlg
ord8
Sections
.text Size: 806KB - Virtual size: 805KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ