Static task
static1
Behavioral task
behavioral1
Sample
bf8737e4b6c93d6dc7329b6a711d305d30f6c83fa0b110a22779540d3150b18a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bf8737e4b6c93d6dc7329b6a711d305d30f6c83fa0b110a22779540d3150b18a.exe
Resource
win10v2004-20220812-en
General
-
Target
bf8737e4b6c93d6dc7329b6a711d305d30f6c83fa0b110a22779540d3150b18a
-
Size
145KB
-
MD5
49f808eaac815e221055d4492512e6e3
-
SHA1
7f2bd4e331cbaf700374469909bf2155b3fff108
-
SHA256
bf8737e4b6c93d6dc7329b6a711d305d30f6c83fa0b110a22779540d3150b18a
-
SHA512
fc3ef9f3ee66f1d5e3cf2f73c8b4c251fab6bf6d0e5adeffc3d75b6df6d2fcce469c03f68f258f1d91afdfb6c79534203264f3a8d26b3c2d0f53b7cbc6f7d77c
-
SSDEEP
3072:W2k596p+GAdtRIux0q2O4OL4hDP61aD3oN4bO:eTg/AOO4b1P6wD3FbO
Malware Config
Signatures
Files
-
bf8737e4b6c93d6dc7329b6a711d305d30f6c83fa0b110a22779540d3150b18a.exe windows x86
dcbbfc43d10e27fbd8324241ceff45cb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindClose
FindFirstFileA
GetPrivateProfileIntA
WritePrivateProfileStringA
GetPrivateProfileStringA
GetProcAddress
GetModuleHandleA
GetCurrentProcess
GetVersionExA
GlobalFree
GlobalAlloc
CreateMutexA
InterlockedIncrement
InterlockedDecrement
LoadLibraryA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
IsBadWritePtr
VirtualAlloc
WriteFile
VirtualFree
GetLastError
OpenMutexW
GetModuleFileNameA
GetFileAttributesA
SetFileAttributesA
DeleteFileA
WaitForMultipleObjects
SetEvent
CloseHandle
WaitForSingleObject
CreateEventA
OutputDebugStringA
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetFileType
GetStdHandle
SetHandleCount
RtlUnwind
CreateThread
GetCurrentThreadId
TlsSetValue
TlsGetValue
ExitThread
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
HeapFree
HeapAlloc
TlsAlloc
SetLastError
TerminateProcess
UnhandledExceptionFilter
HeapReAlloc
HeapSize
GetCPInfo
GetACP
GetOEMCP
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
user32
MsgWaitForMultipleObjectsEx
PostQuitMessage
SetTimer
GetClientRect
DrawTextA
EndPaint
DefWindowProcA
KillTimer
BeginPaint
SetWindowTextA
CreateWindowExA
ShowWindow
UpdateWindow
LoadIconA
LoadCursorA
RegisterClassExA
LoadStringA
PostMessageA
FindWindowA
GetMessageA
TranslateMessage
DispatchMessageA
InvalidateRect
wvsprintfA
DestroyWindow
advapi32
GetTokenInformation
AllocateAndInitializeSid
EqualSid
FreeSid
RegCreateKeyExA
RegNotifyChangeKeyValue
RegSetValueExA
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
RegDeleteValueA
OpenProcessToken
shell32
SHGetSpecialFolderPathA
ShellExecuteA
Sections
.text Size: 32KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 16KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE