Static task
static1
Behavioral task
behavioral1
Sample
0bcc49ba47bf6bba1c8b3bf40938674c20f21ecb2f58a85cba6d5680270aeb02.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
0bcc49ba47bf6bba1c8b3bf40938674c20f21ecb2f58a85cba6d5680270aeb02.exe
Resource
win10v2004-20220812-en
General
-
Target
0bcc49ba47bf6bba1c8b3bf40938674c20f21ecb2f58a85cba6d5680270aeb02
-
Size
269KB
-
MD5
935bb281b2f1d2071478a8d00fa48fc5
-
SHA1
a104ccd85bcfcfdf2965bf64482f3b1cf8343a5a
-
SHA256
0bcc49ba47bf6bba1c8b3bf40938674c20f21ecb2f58a85cba6d5680270aeb02
-
SHA512
d81e094294fb8061c3529c75fcf24018c1bcf2de04e68213bcfa427db0b149abdcaca2a0b2f9e877b64e218c166d066af21684cc8adc8349ff11c240bff7b974
-
SSDEEP
6144:/+E713bstyJj0sC7/HCGr0LckJ4gLlqzj+ETKwX:We386A/HCW0Lx4wlM+ED
Malware Config
Signatures
Files
-
0bcc49ba47bf6bba1c8b3bf40938674c20f21ecb2f58a85cba6d5680270aeb02.exe windows x86
ddbb90ebf41500dde8a2155d2d44be6d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
oleaut32
VariantChangeTypeEx
SysStringLen
SysAllocStringLen
VariantCopyInd
VariantClear
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
advapi32
RegQueryValueExA
RegCloseKey
OpenProcessToken
RegOpenKeyExA
LookupPrivilegeValueA
kernel32
SetCommConfig
CreateFileA
CloseHandle
FindResourceA
Sleep
DeleteFileA
VirtualFree
SetFilePointer
SetErrorMode
GetSystemInfo
RemoveDirectoryA
ReadFile
GetUserDefaultLangID
OutputDebugStringA
GetEnvironmentVariableA
GetWindowsDirectoryA
GetLocaleInfoA
LoadLibraryA
GetACP
LockResource
GetFileSize
FormatMessageA
FlushViewOfFile
GetExitCodeProcess
GetFullPathNameA
GetLastError
GetSystemDefaultLCID
SetEndOfFile
GetFileAttributesA
LoadResource
VirtualQuery
GetCurrentProcess
SizeofResource
GetProcAddress
GetVersionExA
GetModuleHandleA
GetCommandLineA
GetModuleFileNameA
IsDBCSLeadByte
CreateProcessA
VirtualProtect
CreateDirectoryA
VirtualAlloc
InterlockedExchange
WriteFile
ReadFile
GetCommandLineA
GetModuleHandleA
GetLastError
GetStdHandle
CreateFileA
GetFileSize
ExitProcess
WideCharToMultiByte
LocalAlloc
TlsSetValue
VirtualAlloc
LocalFree
WriteFile
LeaveCriticalSection
GetFileType
SetEndOfFile
TlsGetValue
SetFilePointer
CloseHandle
VirtualFree
MultiByteToWideChar
GetSystemTime
RaiseException
EnterCriticalSection
DeleteCriticalSection
user32
MessageBoxA
SetWindowLongA
CharPrevA
ExitWindowsEx
TranslateMessage
MsgWaitForMultipleObjects
LoadStringA
CallWindowProcA
DestroyWindow
CreateWindowExA
PeekMessageA
DispatchMessageA
Sections
.text Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.packed Size: 114KB - Virtual size: 115KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
uyjrwtx Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 135KB - Virtual size: 136KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE