Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.BScope.Trojan.Downloader.13564.16341.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.BScope.Trojan.Downloader.13564.16341.exe
Resource
win10v2004-20220901-en
General
-
Target
SecuriteInfo.com.BScope.Trojan.Downloader.13564.16341.exe
-
Size
2.4MB
-
MD5
b3bd9869bd266f06f95599cb10f269d2
-
SHA1
2d909a4a13024bd40c749c907b3574942d9cdf3d
-
SHA256
d2ab5f5f4da2615d2a058d41b66db5f75782c0aa8db32a37581dc0c6a6938e16
-
SHA512
2f8de9332bebe991393ba05e8897e9445fe698a63712c4b0340b04af60390cce477ccc3da82f64464a67321752287c0c9248880ee5c73b2adaed527cf80b4fe5
-
SSDEEP
49152:ftC7/F/Wzr18ZnCHIGqKhNFNY83OfLvNHCHmsMGpIGJrRfvyOw3+29jDwOXt0acN:ftC7/F/Wzp8ZnCHIGqKhNFNY83OfLvN4
Malware Config
Signatures
Files
-
SecuriteInfo.com.BScope.Trojan.Downloader.13564.16341.exe.exe windows x86
c0a02f7a6b52db8bae1c9b9684eaa9a3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
apdadrv
?ADPortOpen@CApdadrv@@QAEKPBD@Z
??0CApdadrv@@QAE@XZ
?ADSetRWTimeOut@CApdadrv@@QAEXU_COMMTIMEOUTS@@@Z
?ADD4Negotiation@CApdadrv@@QAEKXZ
?ADPortClose@CApdadrv@@QAEHXZ
??1CApdadrv@@QAE@XZ
?ADD4Termination@CApdadrv@@QAEKXZ
?ADGetDeviceID@CApdadrv@@QAEKPAEK@Z
?ADD4SendAndReceiveCtrlCh@CApdadrv@@QAEKPAEK0KAAK@Z
?ADD4SendDataToDataCh@CApdadrv@@QAEKPAEKAAK@Z
?ADInitDevice@CApdadrv@@QAEKXZ
?ADD4ReceiveDataFromDataCh@CApdadrv@@QAEKPAEKAAK@Z
strgene
?GetStrImage@@YAXPAEHPAY1BGI@DA@E@Z
kernel32
LeaveCriticalSection
GlobalReAlloc
EnterCriticalSection
TlsSetValue
LocalReAlloc
TlsGetValue
GetCPInfo
GetOEMCP
GetFileSize
GetFileTime
SetErrorMode
RtlUnwind
RaiseException
GetTimeZoneInformation
GetSystemTime
GetLocalTime
ExitProcess
TerminateProcess
GetStartupInfoA
GetCommandLineA
CreateThread
ExitThread
TlsFree
HeapSize
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
LCMapStringA
LCMapStringW
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalAlloc
GlobalFlags
GetProcessVersion
FindResourceExA
SizeofResource
GetFullPathNameA
GetVolumeInformationA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetCurrentProcess
DuplicateHandle
lstrcpynA
FileTimeToLocalFileTime
FileTimeToSystemTime
InterlockedExchange
GetProfileStringA
GetFileInformationByHandle
PeekNamedPipe
LocalFree
MulDiv
SetLastError
SuspendThread
SetThreadPriority
SetEvent
lstrcmpA
GetCurrentThread
InterlockedIncrement
LoadLibraryA
FreeLibrary
GetVersion
lstrcatA
GetCurrentThreadId
GlobalGetAtomNameA
lstrcmpiA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcpyA
GetModuleHandleA
GetProcAddress
GlobalLock
GlobalUnlock
VirtualProtect
FindResourceA
LoadResource
LockResource
CreateEventA
WaitForSingleObject
WritePrivateProfileStringA
GlobalAlloc
GlobalFree
SetFileAttributesA
FindFirstFileA
MoveFileA
FindNextFileA
FindClose
RemoveDirectoryA
CreateDirectoryA
GetFileAttributesA
DeleteFileA
ResumeThread
GetExitCodeThread
Sleep
GetWindowsDirectoryA
GetPrivateProfileIntA
GetPrivateProfileStringA
WideCharToMultiByte
GetVersionExA
CreateFileA
DeviceIoControl
GetLastError
CloseHandle
MultiByteToWideChar
InterlockedDecrement
HeapReAlloc
HeapFree
GetProcessHeap
HeapAlloc
GetModuleFileNameA
lstrlenA
GetACP
user32
wvsprintfA
PostQuitMessage
SetCursor
GetCursorPos
ValidateRect
GetMessageA
ClientToScreen
GetWindowDC
TabbedTextOutA
DrawTextA
GrayStringA
LoadStringA
DestroyMenu
CharUpperA
GetSysColorBrush
GetClassNameA
PtInRect
InflateRect
MoveWindow
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
GetDlgItemTextA
SendDlgItemMessageA
MapWindowPoints
GetSysColor
AdjustWindowRectEx
ScreenToClient
CopyRect
IsWindowVisible
ScrollWindow
SetScrollInfo
GetScrollRange
GetScrollPos
GetTopWindow
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetMenuItemID
SetWindowPlacement
GetWindowTextLengthA
GetWindowTextA
GetKeyState
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowLongA
RegisterWindowMessageA
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetNextDlgTabItem
EndDialog
IsWindow
CreateDialogIndirectParamA
DestroyWindow
MapDialogRect
SetWindowPos
ShowWindow
GetCapture
GetActiveWindow
SetActiveWindow
GetAsyncKeyState
GetWindowLongA
GetFocus
SetFocus
GetDlgItem
CharNextA
IsWindowUnicode
IsWindowEnabled
KillTimer
SetTimer
PeekMessageA
TranslateMessage
DispatchMessageA
wsprintfA
RedrawWindow
UpdateWindow
LoadCursorA
CopyIcon
GetDlgCtrlID
GetDC
BeginPaint
EndPaint
ReleaseDC
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
InvalidateRect
GetWindowRect
GetClientRect
IsIconic
DrawIcon
GetSystemMetrics
GetSystemMenu
AppendMenuA
LoadIconA
MessageBoxA
SetSystemCursor
PostMessageA
GetParent
SendMessageA
EnableWindow
GetSubMenu
EnableMenuItem
DefDlgProcA
DrawFocusRect
ExcludeUpdateRgn
ShowCaret
HideCaret
UnregisterClassA
CallWindowProcA
gdi32
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
IntersectClipRect
RestoreDC
OffsetViewportOrgEx
GetDeviceCaps
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
PatBlt
EnumFontFamiliesExA
SaveDC
SetViewportOrgEx
SetMapMode
SetBkMode
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateCompatibleDC
CreateDIBitmap
SelectObject
GetTextExtentPointA
BitBlt
SetStretchBltMode
StretchBlt
DeleteObject
CreateFontA
CreateSolidBrush
DeleteDC
CreateBitmap
GetStockObject
comdlg32
GetOpenFileNameA
GetFileTitleA
GetSaveFileNameA
winspool.drv
EnumPortsA
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegCloseKey
RegQueryValueExA
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
shell32
ShellExecuteA
comctl32
CreatePropertySheetPageA
ord17
PropertySheetA
ImageList_Destroy
DestroyPropertySheetPage
ole32
CoInitializeSecurity
CoInitializeEx
CoSetProxyBlanket
CoCreateInstance
CoUninitialize
oleaut32
VariantClear
SafeArrayGetDim
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
SysStringLen
SysAllocStringLen
SysFreeString
SysAllocStringByteLen
SysStringByteLen
SysAllocString
Sections
.text Size: 2.0MB - Virtual size: 2.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 180KB - Virtual size: 178KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 232KB - Virtual size: 317KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 64KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ