Static task
static1
Behavioral task
behavioral1
Sample
bc3f1373dbb311aa8a09ac24a356ef15d47bdc905f00acac0dd7fc30c49764a9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bc3f1373dbb311aa8a09ac24a356ef15d47bdc905f00acac0dd7fc30c49764a9.exe
Resource
win10v2004-20220901-en
General
-
Target
bc3f1373dbb311aa8a09ac24a356ef15d47bdc905f00acac0dd7fc30c49764a9
-
Size
229KB
-
MD5
a058022c30b84392ff4c2b4e9839f7c0
-
SHA1
9b40bb26f493f1de2372ed3ff9568daa8d3b4b3c
-
SHA256
bc3f1373dbb311aa8a09ac24a356ef15d47bdc905f00acac0dd7fc30c49764a9
-
SHA512
49379ab66d895608f4137f18456c50e8c43f1ec99ec325dcbdc1d5e1e4f788e4d9b0a0d26f0fd2bf09d9e238e304f4dce06e033eb84500f8c342aab58d247a41
-
SSDEEP
1536:GSR2Dj1b2iRubQX20YljlGmbNfSfEhCkkEveNc+tXn8FpuHwP:GukbtfX2jJfYO52NpXn8FpuHwP
Malware Config
Signatures
Files
-
bc3f1373dbb311aa8a09ac24a356ef15d47bdc905f00acac0dd7fc30c49764a9.exe windows x86
417c71ff03ccf365ecbdfb66e64d6942
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DispatchMessageA
IsWindowVisible
OffsetRect
GetWindowTextW
GetKeyState
UpdateWindow
SendDlgItemMessageW
GetFocus
GetMessageW
ScreenToClient
KillTimer
GetCursorPos
PeekMessageW
LoadStringW
GetDlgItemTextW
GetWindowLongW
GetDlgCtrlID
TranslateMessage
DestroyWindow
GetSysColor
GetWindowRect
WinHelpW
IsWindow
EndPaint
CheckDlgButton
MessageBeep
CheckDlgButton
MessageBeep
GetFocus
CopyRect
IsWindowVisible
PostQuitMessage
LoadIconW
ReleaseDC
GetDesktopWindow
GetWindowRect
advapi32
InitializeSecurityDescriptor
CloseServiceHandle
AddAccessAllowedAce
CloseServiceHandle
RegOpenKeyW
RegCreateKeyExW
GetTokenInformation
GetTokenInformation
RegDeleteValueW
RegCloseKey
RegSetValueExW
RegCreateKeyExA
SetSecurityDescriptorDacl
RegCloseKey
RegEnumKeyExW
RegQueryInfoKeyW
RegDeleteKeyW
RegSetValueExA
CloseServiceHandle
SetSecurityDescriptorDacl
GetTokenInformation
RegSetValueExW
RegCreateKeyExA
OpenProcessToken
RegOpenKeyExW
RegQueryValueExW
RegEnumKeyExW
RegOpenKeyW
RegQueryInfoKeyW
RegCreateKeyExW
CloseServiceHandle
CloseServiceHandle
RegSetValueExW
RegDeleteValueW
OpenProcessToken
RegSetValueExA
RegSetValueExW
InitializeAcl
RegEnumValueW
OpenProcessToken
RegDeleteKeyW
kernel32
ReadFile
GetStartupInfoW
UnhandledExceptionFilter
DeleteCriticalSection
UnhandledExceptionFilter
WideCharToMultiByte
GetVersionExA
GetCurrentThreadId
DeleteCriticalSection
VirtualFree
SetFilePointer
GetCommandLineW
Sleep
WaitForSingleObject
GetACP
GetLastError
GetProcessHeap
CreateThread
HeapAlloc
lstrcpyW
lstrlenW
lstrcpyW
LocalAlloc
GetCommandLineW
GetStartupInfoW
WaitForSingleObject
InterlockedIncrement
LocalFree
HeapAlloc
GetSystemTimeAsFileTime
ReadFile
GetProcessHeap
GetCurrentThreadId
HeapDestroy
VirtualFree
InterlockedIncrement
LoadLibraryW
GetStartupInfoA
DeleteCriticalSection
HeapDestroy
SetEvent
GetStartupInfoA
VirtualAlloc
MultiByteToWideChar
GetCommandLineW
GetCurrentThreadId
CreateFileW
HeapReAlloc
Sections
.idata Size: 181KB - Virtual size: 184KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gdata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gdata Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
.gdata Size: 1024B - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.gdata Size: 16KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 20KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 512B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 512B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE