Static task
static1
Behavioral task
behavioral1
Sample
bbe84e056b03e771e2f89deff57755b408c90e8aa04c5ce7b3173ba5a6a4c3f1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bbe84e056b03e771e2f89deff57755b408c90e8aa04c5ce7b3173ba5a6a4c3f1.exe
Resource
win10v2004-20220812-en
General
-
Target
bbe84e056b03e771e2f89deff57755b408c90e8aa04c5ce7b3173ba5a6a4c3f1
-
Size
115KB
-
MD5
09a5d8071fdfd83f2fd7b723a5c15193
-
SHA1
6095c201f9c05aa94421c020499b945fda709d34
-
SHA256
bbe84e056b03e771e2f89deff57755b408c90e8aa04c5ce7b3173ba5a6a4c3f1
-
SHA512
82bd0c21055d4501ed29e6c398fe8772b2e3226d8ab81c0ac78216075609d5cdc9216ebdeb6e2ffbe46cb884e2c8875b0fdbe66fc001f894ae58cbf5baedc982
-
SSDEEP
3072:GfVp/jp0hYkB+y5z83cRJbAERDaJVsPrFgVUfIqVkS:GtpEYW+y632JkEMsqeIqV
Malware Config
Signatures
Files
-
bbe84e056b03e771e2f89deff57755b408c90e8aa04c5ce7b3173ba5a6a4c3f1.exe windows x86
e6582bcb1abd646033c7076113ec709d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetAtomNameW
GetFileAttributesW
DeleteVolumeMountPointW
RtlUnwind
SetThreadAffinityMask
CreateMailslotW
CloseHandle
EnumDateFormatsExA
_lcreat
EnumSystemLanguageGroupsA
SetThreadAffinityMask
RemoveDirectoryW
TlsAlloc
GetProfileStringA
UnmapViewOfFile
GetVolumeNameForVolumeMountPointA
EnumCalendarInfoW
FindResourceA
GlobalFix
SetVolumeLabelA
WideCharToMultiByte
OutputDebugStringA
CreateDirectoryW
FatalAppExitW
CreateFileMappingW
SetProcessShutdownParameters
SystemTimeToTzSpecificLocalTime
RemoveDirectoryA
OpenWaitableTimerA
GetCalendarInfoW
SetFilePointerEx
CreateSemaphoreA
GetVolumePathNameA
SetThreadAffinityMask
GlobalUnWire
Process32FirstW
TransactNamedPipe
CreateMutexA
FindNextChangeNotification
psapi
InitializeProcessForWsWatch
EnumDeviceDrivers
GetDeviceDriverFileNameA
user32
SystemParametersInfoA
CreateIconFromResourceEx
GetTopWindow
MapVirtualKeyA
LockSetForegroundWindow
SetCursor
DdeSetUserHandle
SystemParametersInfoW
CharNextW
GetClassInfoW
CharToOemA
ScrollWindow
SetLayeredWindowAttributes
LoadStringA
DialogBoxIndirectParamA
SetDlgItemTextW
CheckMenuItem
GetClassInfoExA
GetCursorInfo
TabbedTextOutW
GetMenuState
CloseWindow
SendNotifyMessageW
VkKeyScanExA
LockWorkStation
EnumDisplayMonitors
GetGUIThreadInfo
SwitchDesktop
IsRectEmpty
MenuItemFromPoint
UnregisterClassA
GetCaretPos
GetScrollRange
ScrollWindowEx
GetSysColorBrush
LookupIconIdFromDirectoryEx
FindWindowA
RegisterShellHookWindow
SendMessageA
InsertMenuA
DefMDIChildProcW
wvsprintfA
SendDlgItemMessageW
GetKeyboardType
GetMonitorInfoW
OemToCharBuffW
GetClassWord
OpenInputDesktop
TileChildWindows
DrawTextExA
AnimateWindow
LoadMenuIndirectW
ShowCaret
DestroyAcceleratorTable
DestroyCursor
SetParent
SwapMouseButton
CharUpperW
PostQuitMessage
WinHelpW
CountClipboardFormats
GetScrollInfo
DlgDirListComboBoxA
CharPrevExA
GetMenuCheckMarkDimensions
SwitchToThisWindow
LoadMenuA
GetClassLongW
DeleteMenu
MapVirtualKeyExA
GetWindowTextLengthA
CharNextA
DefFrameProcW
DdeUninitialize
GetClassNameW
IMPQueryIMEA
GetSystemMetrics
DdeQueryNextServer
EditWndProc
GetSubMenu
LoadIconA
DefWindowProcW
RegisterClipboardFormatA
ShowWindowAsync
CloseDesktop
CreateAcceleratorTableW
SetWindowsHookA
LoadImageW
SendIMEMessageExW
DdeCmpStringHandles
SendMessageCallbackW
AppendMenuW
CharUpperBuffA
SendInput
DialogBoxParamA
DdeAbandonTransaction
ExcludeUpdateRgn
Sections
.text Size: 70KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 38KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 452B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE