Static task
static1
Behavioral task
behavioral1
Sample
bc1a8674df5266f3f27484c064bed919dca66ebcb599f0819ced769664866ce0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bc1a8674df5266f3f27484c064bed919dca66ebcb599f0819ced769664866ce0.exe
Resource
win10v2004-20220901-en
General
-
Target
bc1a8674df5266f3f27484c064bed919dca66ebcb599f0819ced769664866ce0
-
Size
112KB
-
MD5
61563becffcbf7e3d01e7f30d306a120
-
SHA1
4c5f20df39b031e4aa7aa33ea56207a713c0d0b3
-
SHA256
bc1a8674df5266f3f27484c064bed919dca66ebcb599f0819ced769664866ce0
-
SHA512
62d325ff13b6c7254c8770873ed1490e60e4d4f995f660f1d1e50617cd3705534da0c62f17498832e9d2c866927594ec677e879bf8e15e00183805ad73504202
-
SSDEEP
1536:NYJSoedbGjMM5/E7mlhPXkYMpyr1tAEpP/:NMSo0gvh8QptAEpP/
Malware Config
Signatures
Files
-
bc1a8674df5266f3f27484c064bed919dca66ebcb599f0819ced769664866ce0.exe windows x86
fb45086aafdd35beb58e3291670eb756
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadFile
CloseHandle
CreateFileA
GetStringTypeW
GetStringTypeA
GetFileSize
LCMapStringA
GetLocaleInfoA
MultiByteToWideChar
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetOEMCP
GetACP
GetCPInfo
LoadLibraryA
HeapReAlloc
CreateFileW
GetCurrentDirectoryW
GetSystemInfo
GetModuleHandleW
GetLastError
CreateMutexW
GetProcAddress
LCMapStringW
GetModuleHandleA
GetCommandLineA
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
SetFilePointer
EnterCriticalSection
LeaveCriticalSection
RaiseException
ExitProcess
WriteFile
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeCriticalSection
Sleep
SetStdHandle
RtlUnwind
GetConsoleCP
GetConsoleMode
FlushFileBuffers
HeapSize
VirtualAlloc
user32
wsprintfW
SetFocus
SetWindowTextW
FindWindowA
DefWindowProcW
ReleaseDC
SetWindowRgn
GetDC
GetWindowRect
GetCursorPos
SetWindowTextA
wsprintfA
GetWindowTextA
SendMessageA
SendMessageW
MoveWindow
CreateWindowExA
UpdateWindow
ShowWindow
CreateWindowExW
RegisterClassExW
LoadCursorW
LoadIconW
DispatchMessageW
TranslateMessage
GetMessageW
LoadImageA
gdi32
BitBlt
SelectObject
CreateCompatibleDC
CreateRoundRectRgn
GetDeviceCaps
GetObjectW
CreateFontIndirectW
DeleteDC
Sections
<`LtC,@X Size: 40KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
._qeBI58 Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Gr\UB^u< Size: 4KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
c3"WyaKf Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ