Static task
static1
Behavioral task
behavioral1
Sample
bdb1dccbe9fc1e07a9bcc192280883b810db382446f87b0d7188a26b9f205b7c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bdb1dccbe9fc1e07a9bcc192280883b810db382446f87b0d7188a26b9f205b7c.exe
Resource
win10v2004-20220812-en
General
-
Target
bdb1dccbe9fc1e07a9bcc192280883b810db382446f87b0d7188a26b9f205b7c
-
Size
311KB
-
MD5
3709e25039ca66d5f67ed44b6ce9e801
-
SHA1
230bfbc084ddd6b78b1bca065c5f97631f3bf66c
-
SHA256
bdb1dccbe9fc1e07a9bcc192280883b810db382446f87b0d7188a26b9f205b7c
-
SHA512
8297e884bd69e655da3308d5128d85d29ddc3b9f7798077cdd60500306998f8b10fffbdae52083158da44423fa892da48279d11e2d3eeb210c4cb632820fdc40
-
SSDEEP
6144:xLw+ZtK9ynCwKgGNZldkKi9tgMPNuERLYxn3szSIGzQbysmIFZsT:ttKEU/iXPle3szPGUbysNA
Malware Config
Signatures
Files
-
bdb1dccbe9fc1e07a9bcc192280883b810db382446f87b0d7188a26b9f205b7c.exe windows x86
e2713189eea6eee8e1ac6a94becce85e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetCrackUrlA
InternetCanonicalizeUrlA
user32
CharUpperA
MessageBoxA
FindWindowExA
PostMessageA
GetSystemMetrics
CharPrevA
kernel32
GetUserDefaultLCID
RaiseException
GetLocalTime
GetCurrentDirectoryA
FlushFileBuffers
ReleaseMutex
SetHandleCount
UnhandledExceptionFilter
SetUnhandledExceptionFilter
LCMapStringA
lstrcpynA
WaitForSingleObject
MoveFileA
GetSystemTimeAsFileTime
IsValidLocale
TlsGetValue
GetSystemInfo
CloseHandle
DeleteFileA
GetDiskFreeSpaceExA
CompareFileTime
FreeLibrary
lstrlenA
LeaveCriticalSection
CopyFileA
TlsAlloc
MoveFileExA
EnumSystemLocalesA
VirtualFree
RtlUnwind
SystemTimeToFileTime
GetThreadLocale
LoadLibraryExA
IsBadCodePtr
CreateEventA
CopyFileExA
HeapReAlloc
TlsFree
SetEnvironmentVariableA
FreeEnvironmentStringsW
HeapDestroy
HeapFree
GetFileType
FormatMessageA
GetCommandLineA
DeleteCriticalSection
CreateDirectoryA
GetWindowsDirectoryA
VirtualProtect
CreateThread
SetEndOfFile
SetFileAttributesA
GetPrivateProfileStringA
CompareStringA
GetPrivateProfileIntA
EnterCriticalSection
FreeEnvironmentStringsA
WideCharToMultiByte
ReadFile
SetStdHandle
GetThreadPriority
LocalFree
GetModuleHandleA
SetThreadPriority
GetSystemDirectoryA
CompareStringW
FindFirstFileA
FindClose
CreateMutexA
VirtualAlloc
TlsSetValue
IsValidCodePage
GetShortPathNameA
HeapSize
WriteFile
RemoveDirectoryA
FileTimeToSystemTime
GetOEMCP
OpenProcess
ProcessIdToSessionId
HeapAlloc
OutputDebugStringA
ResetEvent
SetFilePointer
GetACP
SetLastError
GetStdHandle
FindNextFileA
GetFileSize
CreateFileA
lstrcmpiA
lstrlenW
GetTimeZoneInformation
LCMapStringW
VirtualQuery
TerminateThread
GetCurrentThreadId
shlwapi
PathRemoveFileSpecA
PathFileExistsA
iphlpapi
GetAdaptersInfo
GetTcpTable
GetUdpTable
GetNumberOfInterfaces
Icmp6ParseReplies
AddIPAddress
SetIpTTL
GetIpStatisticsEx
GetIpAddrTable
InternalSetIfEntry
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
ole32
CoInitialize
CoInitializeEx
CoUninitialize
CoCreateInstance
oleaut32
SysAllocStringByteLen
SysAllocString
VariantClear
SysFreeString
advapi32
InitializeSecurityDescriptor
IsTextUnicode
RevertToSelf
LookupPrivilegeValueA
RegOpenKeyExA
RegCloseKey
AdjustTokenPrivileges
OpenProcessToken
DuplicateTokenEx
ImpersonateLoggedOnUser
RegOpenKeyExW
SetTokenInformation
RegQueryValueExA
SetSecurityDescriptorDacl
RegQueryValueExW
GetTokenInformation
deskperf
DllCanUnloadNow
Sections
.text Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 278KB - Virtual size: 483KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ