Static task
static1
Behavioral task
behavioral1
Sample
bc0088b119889932022e8246e7ec52724edb37c556fb2cd664492b73c3d250d9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bc0088b119889932022e8246e7ec52724edb37c556fb2cd664492b73c3d250d9.exe
Resource
win10v2004-20220812-en
General
-
Target
bc0088b119889932022e8246e7ec52724edb37c556fb2cd664492b73c3d250d9
-
Size
2.5MB
-
MD5
71791d9867c34729ab479320b8c68d59
-
SHA1
24cea50769e98d6bbb7bc9b4dd22895852ac4b32
-
SHA256
bc0088b119889932022e8246e7ec52724edb37c556fb2cd664492b73c3d250d9
-
SHA512
bf768b7169ceb93f6205977df7360e54e620fa2f67e09e16e8150d30d2e581a40c974c637455b5faf01a4f0a9a15e9c36131c8c1d20e89509449c2f7c4efc73b
-
SSDEEP
49152:1M51QF6fLjTX+g2/RiU+9ddstehNpjE87heTN8Uenr2p8wPS30VFcX:e51M6fLjy/S9ddstkpjE4Uenr28wPSD
Malware Config
Signatures
Files
-
bc0088b119889932022e8246e7ec52724edb37c556fb2cd664492b73c3d250d9.exe windows x86
5c514430f41dd0d370a4510402e90cd4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateThread
CreateProcessW
UnmapViewOfFile
CreateToolhelp32Snapshot
Process32FirstW
OpenProcess
ProcessIdToSessionId
Process32NextW
GetModuleHandleW
GetCurrentProcess
GetLongPathNameW
Sleep
GetProcAddress
LoadLibraryW
WaitForSingleObject
SetEnvironmentVariableA
CompareStringW
WriteConsoleW
SetStdHandle
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetConsoleMode
GetConsoleCP
InterlockedExchange
SetConsoleCtrlHandler
FatalAppExitA
GetLocaleInfoW
SetEvent
FlushViewOfFile
MapViewOfFile
ResetEvent
CreateFileMappingW
CreateEventW
SetFilePointer
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GetModuleFileNameW
WriteFile
GetLastError
CloseHandle
ReadFile
GetFileSize
CreateFileW
GetTimeZoneInformation
GetStringTypeW
GetTickCount
QueryPerformanceCounter
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStdHandle
LCMapStringW
GetCurrentThread
SetLastError
TlsFree
TlsAlloc
CreateMutexW
GetLocalTime
MoveFileW
ReleaseMutex
OutputDebugStringW
CopyFileW
DeleteFileW
OpenMutexW
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
MultiByteToWideChar
GetCurrentProcessId
GetUserDefaultLangID
FlushFileBuffers
MoveFileExW
LoadLibraryExW
InterlockedDecrement
LoadLibraryA
IsBadStringPtrW
IsBadReadPtr
WideCharToMultiByte
OutputDebugStringA
FindFirstFileW
VirtualQuery
SetFilePointerEx
GetLogicalDriveStringsW
CreateDirectoryW
GetFileAttributesW
FindClose
RemoveDirectoryW
QueryDosDeviceW
FindNextFileW
SetFileAttributesW
FreeLibrary
Thread32First
GetVersionExW
Thread32Next
GetSystemInfo
FileTimeToSystemTime
FileTimeToLocalFileTime
SystemTimeToFileTime
GetFileSizeEx
CreateFileA
DeviceIoControl
GetModuleFileNameA
GetDiskFreeSpaceExW
lstrlenA
LocalFree
lstrlenW
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
lstrcpyA
lstrcatA
SetEndOfFile
MoveFileWithProgressW
ReplaceFileW
DuplicateHandle
GetFileInformationByHandle
OpenFileMappingW
ResumeThread
GetFileType
VirtualProtect
IsBadWritePtr
GetFileTime
SetFileTime
CopyFileExW
RtlMoveMemory
SetThreadContext
GetThreadContext
GetCurrentThreadId
SuspendThread
OpenThread
SwitchToThread
HeapCreate
TlsGetValue
TlsSetValue
VirtualAllocEx
WriteProcessMemory
VirtualFreeEx
Module32FirstW
Module32NextW
CreateRemoteThread
VirtualFree
VirtualAlloc
EncodePointer
DecodePointer
GetCommandLineW
HeapSetInformation
GetStartupInfoW
GetSystemTimeAsFileTime
GetTimeFormatW
GetDateFormatW
GetTimeFormatA
GetDateFormatA
RtlUnwind
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
ExitProcess
GetCPInfo
InterlockedIncrement
GetACP
GetOEMCP
IsValidCodePage
user32
RegisterClassExW
CreateWindowExW
LoadIconW
GetClipboardData
SetClipboardData
ShowWindow
IsWindowVisible
InternalGetWindowText
DispatchMessageW
TranslateMessage
TranslateAcceleratorW
GetMessageW
UpdateWindow
DialogBoxParamW
DestroyWindow
DefWindowProcW
BeginPaint
EndPaint
PostQuitMessage
EndDialog
MessageBoxW
GetClassNameW
GetForegroundWindow
GetWindowTextW
LoadCursorW
GetDlgItem
advapi32
AdjustTokenPrivileges
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
StartServiceW
CloseServiceHandle
OpenServiceW
OpenSCManagerW
RegEnumValueW
RegSetValueExW
RegQueryValueExW
RegDeleteValueW
RegEnumKeyW
RegQueryInfoKeyW
RegDeleteKeyW
RegOpenKeyExW
RegCloseKey
RegFlushKey
RegCreateKeyExW
OpenProcessToken
LookupPrivilegeValueW
ConvertStringSecurityDescriptorToSecurityDescriptorW
shell32
CommandLineToArgvW
SHGetSpecialFolderPathW
psapi
GetModuleFileNameExW
EnumProcessModules
GetMappedFileNameW
GetModuleInformation
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
shlwapi
StrStrIW
PathFileExistsW
PathMatchSpecW
StrChrW
dbghelp
ImageDirectoryEntryToData
ole32
CoInitializeSecurity
CoUninitialize
CoCreateInstance
CoSetProxyBlanket
CoInitializeEx
oleaut32
GetErrorInfo
SysStringByteLen
VariantChangeType
SysAllocString
SysFreeString
VariantClear
VariantInit
SetErrorInfo
CreateErrorInfo
SysAllocStringByteLen
Sections
.text Size: 787KB - Virtual size: 786KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 33KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
pgdate Size: 1.5MB - Virtual size: 1.5MB