Static task
static1
Behavioral task
behavioral1
Sample
bd9e4ea0a7830abbe0a5c22b544416a1845132b133d9c1b4bd302b59204b3628.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bd9e4ea0a7830abbe0a5c22b544416a1845132b133d9c1b4bd302b59204b3628.exe
Resource
win10v2004-20220812-en
General
-
Target
bd9e4ea0a7830abbe0a5c22b544416a1845132b133d9c1b4bd302b59204b3628
-
Size
857KB
-
MD5
96ca3b7f59058d3f4519dd9602f03939
-
SHA1
f6aa7af6960d7646d08cb26ce59dc03f7a39571e
-
SHA256
bd9e4ea0a7830abbe0a5c22b544416a1845132b133d9c1b4bd302b59204b3628
-
SHA512
4796937079c9da6aee99f8cf80b9d1aa96fd833c9776298b48c0ae77048b1cd3d50782c7e75abe0ba32246dc3a8aef65c4a34088fbea6b0968288e3ecd65a991
-
SSDEEP
24576:UanO0Ot25m6YyVq5rStbd+SGDI+Olan4T4KOpIJ1vxq:UUgt25szr24SGn4EKOpIJC
Malware Config
Signatures
Files
-
bd9e4ea0a7830abbe0a5c22b544416a1845132b133d9c1b4bd302b59204b3628.exe windows x86
8ef283ecc1c296c8c73c07619bc7f12c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SuspendThread
GetCurrentProcess
SystemTimeToFileTime
SetThreadPriority
QueryPerformanceCounter
FormatMessageA
GetLastError
EnterCriticalSection
SizeofResource
DuplicateHandle
GlobalSize
GetFileTime
GetTempPathW
OpenProcess
FindFirstFileA
LockFile
lstrlenA
HeapDestroy
HeapCreate
LoadLibraryA
InterlockedExchangeAdd
ConvertDefaultLocale
GetModuleHandleA
GlobalAlloc
GetFileSizeEx
GetThreadLocale
LockResource
MapViewOfFile
GetSystemTime
SetErrorMode
GetStartupInfoA
GetExitCodeProcess
TlsAlloc
MoveFileExW
AreFileApisANSI
IsValidCodePage
OpenFileMappingA
LocalFree
SetThreadLocale
GetCurrentThreadId
DeleteCriticalSection
WideCharToMultiByte
GetModuleFileNameA
GetTickCount
IsDBCSLeadByteEx
GetSystemInfo
GetACP
CreateDirectoryA
FileTimeToSystemTime
GetLocaleInfoA
DeleteFileA
InterlockedDecrement
GetFileType
PeekNamedPipe
WaitForSingleObject
ReadFile
SetFileTime
GetUserDefaultLCID
GetEnvironmentVariableA
GetCurrentThread
TerminateThread
GetExitCodeThread
GetCurrentProcessId
GetProcessAffinityMask
IsValidLocale
DeviceIoControl
LockFileEx
FindClose
GlobalUnlock
GetProcAddress
GetFileAttributesExA
GetCommandLineA
ExitProcess
GetProcessWorkingSetSize
TlsFree
GetProcessTimes
GetDriveTypeA
GlobalMemoryStatusEx
GetLogicalDriveStringsA
GetSystemTimeAsFileTime
FlushFileBuffers
LocalFileTimeToFileTime
GetProfileStringA
GetVolumeInformationA
RemoveDirectoryA
UnlockFileEx
GetFileSize
ReleaseMutex
SetFilePointer
TerminateProcess
CreateFileMappingA
ReleaseSemaphore
UnmapViewOfFile
ResumeThread
LeaveCriticalSection
CreateMutexA
GetTempFileNameA
GetProcessHeap
CreateProcessA
GlobalFree
LoadResource
GlobalLock
CreateSemaphoreA
FindNextFileA
SetEndOfFile
SetLastError
ExpandEnvironmentStringsA
CloseHandle
FindResourceA
SetEnvironmentVariableA
GetWindowsDirectoryA
LocalAlloc
GetFileAttributesA
VirtualProtect
FindFirstFileExA
InterlockedIncrement
GetComputerNameA
SetCurrentDirectoryA
GetShortPathNameA
CreateFileA
HeapSize
GetCPInfo
Sleep
SetUnhandledExceptionFilter
GetTempPathA
WriteFile
TlsGetValue
MultiByteToWideChar
UnlockFile
GetDiskFreeSpaceA
GlobalMemoryStatus
InitializeCriticalSection
GetFullPathNameA
GetThreadTimes
SetThreadExecutionState
CreateThread
TlsSetValue
GetStdHandle
FreeLibrary
SetNamedPipeHandleState
GetVersionExA
CopyFileA
DeleteFileW
InterlockedExchange
CreatePipe
InterlockedCompareExchange
user32
CloseClipboard
SetMenuItemInfoW
RemoveMenu
DdeCreateStringHandleW
GetWindow
GetCapture
GetForegroundWindow
SetScrollInfo
InflateRect
CreateDialogParamW
GetWindowTextW
GetWindowLongW
SetTimer
MessageBeep
GetUpdateRect
ClientToScreen
GetAsyncKeyState
SetWindowTextW
ChangeDisplaySettingsW
DrawEdge
ValidateRect
BeginDeferWindowPos
ModifyMenuW
GetMenuState
DdeCreateDataHandle
CreateMenu
DefWindowProcW
EndDialog
GetCursorPos
DispatchMessageW
LoadIconW
SetWindowPos
SetClipboardData
DrawIcon
EnumWindows
DdeConnect
GetSysColor
GetSystemMenu
SetParent
GetClassInfoW
GetWindowThreadProcessId
CopyRect
GetMessageW
DestroyMenu
SetWindowsHookExW
UnionRect
LoadCursorFromFileW
TranslateMessage
InsertMenuItemW
OffsetRect
GetMessagePos
DestroyCursor
SetCursor
FillRect
DdeNameService
ReleaseDC
GetDesktopWindow
AppendMenuW
DdeUninitialize
SetMenu
DdeGetLastError
IsWindowVisible
EnumClipboardFormats
DdePostAdvise
GetMenuItemInfoW
IsZoomed
GetKeyboardState
DdeFreeStringHandle
UnhookWindowsHookEx
SendMessageW
ShowWindow
InvalidateRect
GetFocus
GetMenuItemCount
ShowCursor
GetDoubleClickTime
WaitForInputIdle
CallWindowProcW
SetCapture
EmptyClipboard
RegisterWindowMessageW
GetParent
SetForegroundWindow
DdeDisconnect
VkKeyScanW
ReleaseCapture
ChildWindowFromPoint
AdjustWindowRectEx
EndDeferWindowPos
DrawFocusRect
DdeFreeDataHandle
IsIconic
GetUpdateRgn
DrawTextW
GetClassNameW
SetWindowRgn
GetIconInfo
MsgWaitForMultipleObjects
TrackPopupMenu
GetMessageTime
MessageBoxW
RegisterClassW
IsWindow
EnumThreadWindows
PostMessageW
EnableMenuItem
GetWindowDC
DestroyWindow
EndPaint
EnumDisplaySettingsW
WindowFromPoint
UpdateWindow
MapWindowPoints
GetClipboardData
CheckMenuItem
UnregisterClassW
CreatePopupMenu
BringWindowToTop
DeferWindowPos
MoveWindow
TranslateAcceleratorW
GetWindowTextLengthW
DrawStateW
InsertMenuW
keybd_event
GetDlgItem
CheckMenuRadioItem
KillTimer
IsDialogMessageW
GetDC
GetScrollInfo
RegisterClipboardFormatW
GetWindowRect
LoadBitmapW
CreateAcceleratorTableW
ScreenToClient
ScrollWindow
SetWindowLongW
BeginPaint
DdeGetData
FlashWindow
FindWindowExW
DdeQueryStringW
IsClipboardFormatAvailable
GetSystemMetrics
OpenClipboard
ToUnicode
CreateDialogIndirectParamW
GetClientRect
DrawMenuBar
EndMenu
DestroyIcon
DestroyAcceleratorTable
PeekMessageW
SetFocus
DrawIconEx
CallNextHookEx
CreateIconIndirect
DdeClientTransaction
ExitWindowsEx
LoadAcceleratorsW
ShowCaret
RedrawWindow
DdeInitializeW
PostThreadMessageW
SetCursorPos
LoadImageW
GetKeyState
GetClipboardFormatNameW
IsWindowEnabled
GetSubMenu
GetMenu
HideCaret
EnableWindow
DrawFrameControl
CreateWindowExW
PtInRect
GetActiveWindow
SystemParametersInfoW
PostQuitMessage
gdi32
ExtCreatePen
SetBkMode
GetTextMetricsW
Polyline
SelectObject
SetViewportOrgEx
CreatePen
Arc
PatBlt
EqualRgn
Ellipse
SetMapMode
GetTextColor
RectInRegion
GetDeviceCaps
SetMetaFileBitsEx
GetPaletteEntries
OffsetRgn
GetBkColor
SetROP2
SetBkColor
SetTextAlign
StretchDIBits
GetObjectW
SetViewportExtEx
GetTextExtentExPointW
Pie
SetStretchBltMode
SaveDC
PlayEnhMetaFile
GetCharABCWidthsW
LineTo
GetClipBox
CreateDIBitmap
GetRgnBox
CreateICW
StretchBlt
RealizePalette
GetStockObject
GdiFlush
RoundRect
CreateCompatibleDC
SetPixel
Polygon
CreateFontIndirectW
Rectangle
BitBlt
SetWindowExtEx
CreatePalette
CreatePolygonRgn
MoveToEx
GetWinMetaFileBits
TextOutW
CreateBitmap
ExtCreateRegion
CreateBitmapIndirect
ExcludeClipRect
SetWinMetaFileBits
CopyEnhMetaFileW
GetDIBits
CreateHatchBrush
SelectClipRgn
GetTextExtentPoint32W
CreateSolidBrush
CreateRectRgnIndirect
GetEnhMetaFileHeader
GetMetaFileBitsEx
CloseEnhMetaFile
CreateEnhMetaFileW
MaskBlt
GetEnhMetaFileW
EnumFontFamiliesExW
ExtFloodFill
PtInRegion
GetPixel
GetRegionData
RestoreDC
CreatePatternBrush
SetBrushOrgEx
CreateRectRgn
GetDIBColorTable
SetPolyFillMode
CreateDIBSection
GetNearestPaletteIndex
DeleteEnhMetaFile
SelectPalette
GetSystemPaletteEntries
SetTextColor
ExtSelectClipRgn
DeleteDC
PolyPolygon
CreateCompatibleBitmap
CombineRgn
DeleteObject
SetWindowOrgEx
comdlg32
ChooseFontW
GetOpenFileNameW
ChooseColorW
GetSaveFileNameW
CommDlgExtendedError
advapi32
RegEnumKeyW
RegEnumValueW
OpenProcessToken
RegSetValueExW
RegOpenKeyExW
ControlService
AdjustTokenPrivileges
OpenServiceW
RegOpenKeyExA
RegQueryInfoKeyW
RegDeleteKeyW
RegDeleteValueW
RegQueryValueExW
OpenSCManagerW
GetUserNameW
RegQueryValueExA
RegCreateKeyW
LookupPrivilegeValueW
RegCloseKey
CloseServiceHandle
shell32
DragQueryFileW
ShellExecuteExW
DragFinish
SHGetPathFromIDListW
SHGetFileInfoW
ExtractIconExW
ExtractIconW
Shell_NotifyIconW
SHGetSpecialFolderLocation
SHBrowseForFolderW
SHGetIconOverlayIndexW
SHFileOperationW
DragAcceptFiles
SHGetFolderPathW
SHGetMalloc
DragQueryPoint
oleaut32
SysAllocString
SysStringLen
winmm
PlaySoundW
oledlg
ord3
Sections
.text Size: 405KB - Virtual size: 405KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 45KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 385KB - Virtual size: 469KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ