Bgxbisukvi
Static task
static1
Behavioral task
behavioral1
Sample
fe2320208f29e7bf6a32adc324bd1852cf1b24fcd762d999d438ed4fff6eb708.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
fe2320208f29e7bf6a32adc324bd1852cf1b24fcd762d999d438ed4fff6eb708.dll
Resource
win10v2004-20220812-en
General
-
Target
fe2320208f29e7bf6a32adc324bd1852cf1b24fcd762d999d438ed4fff6eb708
-
Size
87KB
-
MD5
31792e889aa5aa2d7fd0a9025fb598c6
-
SHA1
746a5ff64f345390f6d026a1f2307796366b235b
-
SHA256
fe2320208f29e7bf6a32adc324bd1852cf1b24fcd762d999d438ed4fff6eb708
-
SHA512
5cfacc772ea3d1ba765f2f58d6e22fe5ef98f21bd738c9ffce7e3e6c896459a54682fe80a3cd1e77bdec0bca9a49c8ffdbda3e839d3ab068357ff954b27a374f
-
SSDEEP
1536:PGXqHa2yt8y2J/JbQDwLYVw2t5rzl85iWaYB9FKMCD2TfMapWHakmCCl1o:9aP8y2Jw6YLrSiQKD2Mac6Bli
Malware Config
Signatures
Files
-
fe2320208f29e7bf6a32adc324bd1852cf1b24fcd762d999d438ed4fff6eb708.dll windows x86
ae476b5c27739c531c97326508ce819f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
DeleteService
LookupPrivilegeNameA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
SetEntriesInAccessListW
ConvertSecurityDescriptorToAccessNamedA
kernel32
VirtualAlloc
CloseHandle
CreateMutexA
GetCurrentThreadId
GetLastError
MapViewOfFile
MultiByteToWideChar
OpenFileMappingA
ReleaseMutex
WaitForSingleObject
GetCommandLineW
LoadResource
FindResourceA
CompareStringW
CompareStringA
GetLocaleInfoW
GetSystemInfo
VirtualProtect
GetTimeZoneInformation
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
LCMapStringW
GetCommandLineA
GetVersionExA
ExitProcess
GetProcAddress
GetModuleHandleA
TerminateProcess
GetCurrentProcess
TlsAlloc
SetLastError
GetCurrentThread
TlsFree
TlsSetValue
TlsGetValue
HeapFree
HeapAlloc
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
UnhandledExceptionFilter
WriteFile
LeaveCriticalSection
FatalAppExitA
EnterCriticalSection
GetACP
GetOEMCP
GetCPInfo
HeapReAlloc
IsBadWritePtr
InitializeCriticalSection
RtlUnwind
InterlockedExchange
VirtualQuery
LoadLibraryA
HeapSize
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
GetStringTypeA
GetStringTypeW
LCMapStringA
SetEnvironmentVariableA
ole32
OleSetMenuDescriptor
UtGetDvtd32Info
rpcrt4
NdrMesTypeDecode2
RpcSmGetThreadHandle
RpcStringFreeW
user32
MessageBoxExA
SetWindowPlacement
CharUpperW
Exports
Exports
Sections
.text Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ