Static task
static1
Behavioral task
behavioral1
Sample
bc6916b5703f82644c9a3565ddc9fda773607f6351049e263abc9e1208e70be2.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
bc6916b5703f82644c9a3565ddc9fda773607f6351049e263abc9e1208e70be2.exe
Resource
win10v2004-20220901-en
General
-
Target
bc6916b5703f82644c9a3565ddc9fda773607f6351049e263abc9e1208e70be2
-
Size
227KB
-
MD5
90ea53c806848f48a385d4a57426cf60
-
SHA1
0f092e60d794f1197df5602b83ce37c628972994
-
SHA256
bc6916b5703f82644c9a3565ddc9fda773607f6351049e263abc9e1208e70be2
-
SHA512
bd989071a9b500ef4ed8501314b9edad23c4fd1839ea7135873192f15fcddde4d1cb3544629d11dea29bdc49e60f8dab4c4dc3d07966fd53bfcc089682b21f67
-
SSDEEP
3072:wfu5+5cSNS6wo/kzE92F6fxoJDak7nuP4Ibzw+kkTsCtomPcktD9c5bSJ6yanTvZ:RoDS6wgCoSJDVnK4IbzJ7VtoY7Ab0I
Malware Config
Signatures
Files
-
bc6916b5703f82644c9a3565ddc9fda773607f6351049e263abc9e1208e70be2.exe windows x86
ea89ed4afba7c964c7cf2607135f3728
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetDlgItem
MsgWaitForMultipleObjects
LoadStringW
SendMessageW
EnableWindow
PeekMessageW
DispatchMessageW
IsWindow
GetSystemMetrics
ShowCursor
LoadCursorW
SetCursor
LoadImageW
LoadBitmapW
RegisterClipboardFormatW
GetParent
wsprintfW
LoadIconW
PostMessageW
SetDlgItemTextW
SetFocus
InvalidateRect
UpdateWindow
WinHelpW
SetWindowLongW
advapi32
InitializeSecurityDescriptor
SetFileSecurityW
InitializeAcl
GetAce
LookupAccountSidW
RegSetValueExA
RegSetValueExW
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExW
RegQueryValueExA
RegCloseKey
AddAccessAllowedAce
utildll
StrConnectState
StrAsyncConnectState
kernel32
GetProcessAffinityMask
OpenProcess
MultiByteToWideChar
GetThreadTimes
GetModuleHandleA
GetPriorityClass
lstrcmpW
SetEvent
CreateEventW
Sleep
FreeLibrary
SetProcessAffinityMask
LoadLibraryA
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetCurrentDirectoryW
SetUnhandledExceptionFilter
GetTickCount
HeapSize
GetProcAddress
GetNumberFormatW
HeapReAlloc
lstrlenW
GetCurrentProcess
GetCommandLineW
GetStartupInfoW
GetModuleHandleW
ExitProcess
CreateMutexW
GetCurrentProcessId
ReleaseMutex
SetProcessShutdownParameters
WaitForSingleObject
ExpandEnvironmentStringsW
CreateProcessW
GetCurrentThreadId
FormatMessageW
GetVersionExW
GetLocaleInfoW
LocalAlloc
LocalFree
HeapFree
HeapAlloc
GetProcessHeap
CreateThread
CloseHandle
lstrcpynW
lstrcpyW
GetLastError
LoadLibraryW
InterlockedCompareExchange
GetVersionExA
IsBadWritePtr
SetLastError
GetCurrentThread
UnhandledExceptionFilter
rasapi32
RasDeleteEntryW
RasSetAutodialAddressW
RasRenameEntryW
RasEnumConnectionsW
RasHangUpW
RasGetConnectStatusW
RasValidateEntryNameW
Sections
.text Size: 92KB - Virtual size: 91KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.seca Size: 1KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.secb Size: 2KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.secc Size: 2KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.secd Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sece Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.secf Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.datx Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 98KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.inte Size: 3KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ