Static task
static1
Behavioral task
behavioral1
Sample
bcaa1e0475bd9b8d4e22935f420bcd0a4924c0cc1f25047ddff48377e65e7efe.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
bcaa1e0475bd9b8d4e22935f420bcd0a4924c0cc1f25047ddff48377e65e7efe.exe
Resource
win10v2004-20220812-en
General
-
Target
bcaa1e0475bd9b8d4e22935f420bcd0a4924c0cc1f25047ddff48377e65e7efe
-
Size
155KB
-
MD5
830c7b9c0158b8c7a2eaa5d8c3670ec0
-
SHA1
209d952697d3b022f098c7696ed0a27be0b6265b
-
SHA256
bcaa1e0475bd9b8d4e22935f420bcd0a4924c0cc1f25047ddff48377e65e7efe
-
SHA512
65c66b701c4e8dc61c857cca51597150159c24548427f408cf0e256216555753c96db1672e4035ab2d311019aa15a5116c25d7bd90f92f8041a3b177e5eb1957
-
SSDEEP
3072:QXJ5GpxZzTbjqb0bwco8mLcT1s3t7JV0YKv8bQMlzW5hTaPFa3ZlAr:QXJk/R+b0DmLcTuHVJNbdpW5hTaPF9
Malware Config
Signatures
Files
-
bcaa1e0475bd9b8d4e22935f420bcd0a4924c0cc1f25047ddff48377e65e7efe.exe windows x86
f3cf3d8e3cfbed38a8d7a68cd3b19e7f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateEventA
GetLocalTime
ExitProcess
MultiByteToWideChar
GetProcAddress
CreateProcessA
SetFilePointer
ReadFile
Sleep
WriteFile
RemoveDirectoryA
LocalAlloc
LocalFree
CreateDirectoryA
GetVersionExA
lstrcmpA
FreeLibrary
GlobalFree
GlobalUnlock
OutputDebugStringA
ReleaseMutex
GetModuleHandleA
GetStartupInfoA
lstrcatA
GetPrivateProfileSectionNamesA
lstrlenA
SetEvent
lstrcpyA
VirtualAlloc
VirtualFree
CloseHandle
LoadLibraryA
SetErrorMode
user32
GetKeyState
SetCapture
WindowFromPoint
GetMessageA
GetAsyncKeyState
SetClipboardData
EmptyClipboard
OpenClipboard
GetSystemMetrics
LoadCursorA
GetWindowTextA
GetForegroundWindow
ExitWindowsEx
CloseClipboard
CharNextA
TranslateMessage
DispatchMessageA
IsWindow
SetCursorPos
SendMessageA
CloseWindow
CreateWindowExA
PostMessageA
OpenDesktopA
GetThreadDesktop
CloseDesktop
IsWindowVisible
GetWindowThreadProcessId
GetCursorPos
SetRect
ReleaseDC
gdi32
DeleteDC
CreateDIBSection
SelectObject
BitBlt
CreateCompatibleBitmap
GetDIBits
DeleteObject
advapi32
RegQueryValueA
RegCloseKey
LsaOpenPolicy
LsaRetrievePrivateData
LsaClose
LookupAccountNameA
IsValidSid
RegSetValueExA
RegQueryValueExA
RegOpenKeyA
RegCreateKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
LookupAccountSidA
GetTokenInformation
shell32
SHGetSpecialFolderPathA
SHGetFileInfoA
ole32
CoCreateInstance
CoInitialize
CoUninitialize
msvcrt
_acmdln
_strnicmp
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
exit
_XcptFilter
_exit
??1type_info@@UAE@XZ
calloc
_beginthreadex
strncat
strncpy
wcscpy
_errno
??2@YAPAXI@Z
__CxxFrameHandler
_CxxThrowException
??3@YAXPAX@Z
memmove
ceil
_ftol
strstr
strchr
malloc
free
_except_handler3
strrchr
rename
atoi
strncmp
ws2_32
__WSAFDIsSet
gethostname
recvfrom
sendto
WSAStartup
listen
accept
getpeername
bind
getsockname
inet_addr
inet_ntoa
select
closesocket
ntohs
socket
gethostbyname
htons
connect
setsockopt
WSACleanup
send
msvcp60
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
netapi32
NetUserAdd
NetLocalGroupAddMembers
msvfw32
ICSeqCompressFrameEnd
ICSendMessage
psapi
EnumProcessModules
wtsapi32
WTSQuerySessionInformationA
WTSFreeMemory
Sections
.text Size: 118KB - Virtual size: 117KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ujyhkuy Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ