Static task
static1
Behavioral task
behavioral1
Sample
bc4c50d4b9c3da54d2e9eb4c5004c71ab2dc8b068b1873da7740774e79e5495f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bc4c50d4b9c3da54d2e9eb4c5004c71ab2dc8b068b1873da7740774e79e5495f.exe
Resource
win10v2004-20220901-en
General
-
Target
bc4c50d4b9c3da54d2e9eb4c5004c71ab2dc8b068b1873da7740774e79e5495f
-
Size
785KB
-
MD5
6cf5ecd87334b4defd9d7f5e07ca3ad0
-
SHA1
13484371a3a27f6ad285a2676ea0a037ea6cc99e
-
SHA256
bc4c50d4b9c3da54d2e9eb4c5004c71ab2dc8b068b1873da7740774e79e5495f
-
SHA512
7f965a544939adff28319ba02e3d937722a1dc118c9d6caf0bbcb506e7af8f35a49d5af4cc3a596507e0c88a80b2035d1211aa2a128354dfc6b6b3d97f8a44f9
-
SSDEEP
24576:4EqXBSdMqnpNrzB9m6ZouM+3fHucLd6rOrppNr:OGB9RoD+vHuG
Malware Config
Signatures
Files
-
bc4c50d4b9c3da54d2e9eb4c5004c71ab2dc8b068b1873da7740774e79e5495f.exe windows x86
20a2a1f9bec7c4bf2d4ab7d64e9f6979
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FormatMessageW
FreeLibrary
GetComputerNameExW
GetComputerNameW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDateFormatW
GetFileAttributesW
GetFileSize
GetFullPathNameW
GetLastError
GetLocalTime
GetModuleFileNameW
GetModuleHandleW
GetProcAddress
GetQueuedCompletionStatus
GetStartupInfoW
GetStdHandle
GetSystemDefaultUILanguage
GetSystemTime
GetSystemTimeAsFileTime
GetTempPathW
GetTimeFormatW
GetVersionExW
HeapAlloc
HeapCreate
HeapFree
HeapReAlloc
InitializeCriticalSection
InterlockedDecrement
InterlockedExchange
InterlockedExchangeAdd
InterlockedIncrement
FileTimeToSystemTime
LoadLibraryA
LoadLibraryExW
LoadLibraryW
LoadResource
LocalAlloc
LocalFree
LockResource
FindResourceExW
PostQueuedCompletionStatus
RaiseException
ReadFile
ReleaseMutex
ReleaseSemaphore
SetConsoleCtrlHandler
SetErrorMode
SetEvent
SetFileAttributesW
SetLastError
SetThreadExecutionState
SetWaitableTimer
Sleep
SystemTimeToFileTime
SystemTimeToTzSpecificLocalTime
VirtualFree
WaitForMultipleObjects
WaitForSingleObject
WideCharToMultiByte
WriteFile
lstrcmpiW
lstrcpyW
lstrlenW
VirtualAllocEx
GetModuleHandleA
GetDriveTypeA
FileTimeToLocalFileTime
FileTimeToDosDateTime
ExpandEnvironmentStringsW
ExitProcess
EnterCriticalSection
DuplicateHandle
DeleteFileW
CreateWaitableTimerW
CreateThread
CreateSemaphoreW
CreateMutexW
CreateIoCompletionPort
CreateFileW
CreateFileMappingW
CreateEventW
CreateDirectoryW
FindNextFileW
FindFirstFileW
MapViewOfFile
FindClose
CopyFileW
CloseHandle
LeaveCriticalSection
CancelWaitableTimer
user32
SetThreadDesktop
SetProcessWindowStation
PostMessageW
OpenWindowStationW
OpenDesktopW
wsprintfW
LoadStringW
IsWindow
GetThreadDesktop
GetProcessWindowStation
CloseWindowStation
CloseDesktop
LoadIconW
LoadCursorA
MessageBoxW
gdi32
GetEnhMetaFileW
CreateHalftonePalette
GetEnhMetaFileA
advapi32
CloseServiceHandle
AddAccessAllowedAce
AccessCheck
ControlService
CopySid
CreateServiceW
DeleteService
FreeSid
GetLengthSid
OpenSCManagerW
OpenServiceW
OpenThreadToken
QueryServiceStatus
RegisterServiceCtrlHandlerW
SetServiceStatus
StartServiceCtrlDispatcherW
RegOpenKeyA
RegQueryValueExA
AllocateAndInitializeSid
shell32
SHGetPathFromIDListW
SHGetSpecialFolderLocation
SHGetMalloc
ole32
StringFromIID
StringFromGUID2
IIDFromString
CoUninitialize
CoTaskMemFree
CoInitialize
CoCreateInstance
msvcrt
wprintf
wcsrchr
wcsncpy
wcslen
wcscpy
wcscmp
wcschr
wcscat
_XcptFilter
__p__commode
__p__fmode
__set_app_type
__setusermatherr
__wgetmainargs
_adjust_fdiv
_controlfp
_except_handler3
_exit
_initterm
_ltow
_vsnwprintf
_wcmdln
_wcsicmp
_wcsnicmp
_wsplitpath
_wtoi
exit
gets
qsort
swprintf
tolower
towlower
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 775KB - Virtual size: 775KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ