Static task
static1
Behavioral task
behavioral1
Sample
bd51a3600d95208d2a94ab33f868e8a5512a806eeccde159cd6f46e657e2f2f4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bd51a3600d95208d2a94ab33f868e8a5512a806eeccde159cd6f46e657e2f2f4.exe
Resource
win10v2004-20220901-en
General
-
Target
bd51a3600d95208d2a94ab33f868e8a5512a806eeccde159cd6f46e657e2f2f4
-
Size
267KB
-
MD5
6bc3837e759f9a9d2342f57644bebcb0
-
SHA1
9ba97fa2a5b8b07895559efb23a595fa1051cb5b
-
SHA256
bd51a3600d95208d2a94ab33f868e8a5512a806eeccde159cd6f46e657e2f2f4
-
SHA512
3665b4e9b589b7862dc32cf5e8cd4e45441c9b00c8f2b16d3430288943803a0c3ee5eb8aade2b2843c9071051fa4fb1956e4d114c6d8a675b3036572e11ddf85
-
SSDEEP
6144:ljYIx6ZQARKs6Vr3dhd5PU/61+d12Bs3y90In:lj1aRKzpDHM/qG5yNn
Malware Config
Signatures
Files
-
bd51a3600d95208d2a94ab33f868e8a5512a806eeccde159cd6f46e657e2f2f4.exe windows x86
44a00b7c3fbdf9883c37c6d6fbd10239
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DrawMenuBar
LoadStringA
LoadMenuA
PeekMessageA
InvertRect
wsprintfA
GetMenuCheckMarkDimensions
GetWindowTextA
DefWindowProcA
IsClipboardFormatAvailable
IsWindowUnicode
InSendMessage
TrackMouseEvent
GetMonitorInfoW
GetKeyboardLayoutNameW
IsCharAlphaNumericA
InvalidateRect
WindowFromDC
MapVirtualKeyA
GetUserObjectInformationW
GetListBoxInfo
GetMenuItemRect
CheckMenuItem
GetAltTabInfoA
GetCursor
EndDeferWindowPos
NotifyWinEvent
CopyImage
BeginDeferWindowPos
PrintWindow
InSendMessageEx
GetMenuBarInfo
HiliteMenuItem
GetPriorityClipboardFormat
GetLayeredWindowAttributes
ScrollWindow
WaitForInputIdle
ChangeClipboardChain
GetMonitorInfoA
GetIconInfo
KillTimer
MapVirtualKeyW
GetMessageTime
GetClipboardFormatNameA
IsCharAlphaW
GetWindowLongA
GetDialogBaseUnits
GetMenuItemCount
comdlg32
GetOpenFileNameA
shell32
SHGetMalloc
advapi32
SetFileSecurityW
gdi32
TextOutW
GetCharWidthA
Arc
SetWindowOrgEx
StretchBlt
ExtTextOutW
kernel32
GetStringTypeA
LCMapStringW
MultiByteToWideChar
GetLocaleInfoA
RtlUnwind
HeapReAlloc
HeapAlloc
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
InitializeCriticalSectionAndSpinCount
LoadLibraryA
EnterCriticalSection
GetStringTypeW
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
HeapFree
VirtualFree
InterlockedDecrement
GetCurrentThreadId
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
GetFileType
SetHandleCount
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
GetStdHandle
LeaveCriticalSection
Sleep
DisconnectNamedPipe
GetModuleFileNameW
FlushFileBuffers
EscapeCommFunction
GetCommTimeouts
GetCommandLineW
FlushViewOfFile
WTSGetActiveConsoleSessionId
RequestDeviceWakeup
GlobalUnlock
SetCommMask
SetCommState
SetProcessShutdownParameters
AssignProcessToJobObject
GetNamedPipeInfo
GetLastError
CloseHandle
GetEnvironmentStrings
GetThreadSelectorEntry
VirtualAlloc
HeapCreate
TlsGetValue
GetTickCount
WinExec
GetShortPathNameA
GetCurrentThread
VirtualProtectEx
GetTempFileNameW
CreateMutexA
LocalUnlock
DeleteCriticalSection
GetTempPathW
HeapSize
SetThreadLocale
IsDBCSLeadByteEx
TlsAlloc
IsBadCodePtr
SearchPathA
EncodePointer
DeleteFileA
DeleteFileW
FormatMessageW
SetUnhandledExceptionFilter
LCMapStringA
GlobalFlags
lstrcmpW
EndUpdateResourceW
GetCommandLineA
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleW
GetProcAddress
ExitProcess
WriteFile
Sections
.text Size: 213KB - Virtual size: 213KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ