Static task
static1
Behavioral task
behavioral1
Sample
bdf0a68864cb8f4e3513df40e82c1c5d00d9d5801d2a66af72c637d571fbce64.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bdf0a68864cb8f4e3513df40e82c1c5d00d9d5801d2a66af72c637d571fbce64.exe
Resource
win10v2004-20220812-en
General
-
Target
bdf0a68864cb8f4e3513df40e82c1c5d00d9d5801d2a66af72c637d571fbce64
-
Size
303KB
-
MD5
04c36e0468b94e76c986b655a1959aa1
-
SHA1
b0e58f02046376699362278ff527cbd4d5767a86
-
SHA256
bdf0a68864cb8f4e3513df40e82c1c5d00d9d5801d2a66af72c637d571fbce64
-
SHA512
2f7bda280b6cd4bf26573b5d1ca99558b63978fe5d51c024abb79454c7754a2a1dc734a45975f50add4b54a573e37884ad58808e50239c48ad30cec2d49a043a
-
SSDEEP
6144:QoNT53twG7w7gmXQ1m+U8DMQEfGhfKg4:1P9wGUgmQSECg
Malware Config
Signatures
Files
-
bdf0a68864cb8f4e3513df40e82c1c5d00d9d5801d2a66af72c637d571fbce64.exe windows x86
d774992a6adfc9cb43759280fa2c9438
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shfolder
SHGetFolderPathW
kernel32
GetSystemInfo
VirtualQuery
RtlUnwind
ExitProcess
TerminateProcess
GetStartupInfoA
GetCommandLineA
GetSystemTimeAsFileTime
SetEnvironmentVariableA
HeapReAlloc
SetStdHandle
GetFileType
HeapSize
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
LCMapStringA
LCMapStringW
VirtualAlloc
IsBadReadPtr
IsBadCodePtr
GetLocaleInfoW
InterlockedExchange
MultiByteToWideChar
WideCharToMultiByte
GetLastError
GetVersion
lstrcmpiA
lstrlenA
CompareStringA
CompareStringW
GetCurrentDirectoryA
SizeofResource
LockResource
LoadResource
FindResourceA
GetModuleHandleA
RemoveDirectoryA
SetCurrentDirectoryA
Sleep
VirtualProtect
HeapFree
HeapAlloc
SetErrorMode
WritePrivateProfileStringA
RaiseException
GetOEMCP
GetCPInfo
InterlockedIncrement
GlobalFlags
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
TlsGetValue
EnterCriticalSection
GlobalHandle
GlobalReAlloc
LeaveCriticalSection
SetEndOfFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
InterlockedDecrement
WaitForSingleObject
lstrcmpA
GetModuleFileNameA
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
GlobalFree
MulDiv
GlobalAlloc
GlobalLock
SetFileAttributesA
GetFileAttributesA
GetShortPathNameA
FindClose
FindNextFileA
DeleteFileA
FindFirstFileA
GetTempPathA
CloseHandle
GlobalUnlock
FindResourceExA
CreateDirectoryA
FreeResource
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcatA
lstrcmpW
lstrcpynA
GetThreadLocale
GetLocaleInfoA
GetACP
FreeLibrary
CreateFileA
GetUserDefaultLangID
CreateProcessA
GetExitCodeProcess
GetSystemDirectoryA
GetWindowsDirectoryA
GetCurrentThread
LocalAlloc
GetCurrentProcess
GetVersionExA
FormatMessageA
LocalFree
CopyFileA
SetLastError
LoadLibraryA
GetProcAddress
SetUnhandledExceptionFilter
user32
GetSysColorBrush
GetMenuItemInfoA
InflateRect
LoadMenuA
DestroyMenu
UnpackDDElParam
ReuseDDElParam
ReleaseCapture
LoadAcceleratorsA
InvalidateRect
InsertMenuItemA
CreatePopupMenu
SetRectEmpty
BringWindowToTop
SetMenu
TranslateAcceleratorA
GetMessageA
GetCursorPos
ValidateRect
ShowOwnedPopups
SetCursor
PostQuitMessage
GetDesktopWindow
GetActiveWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
FillRect
SetMenuItemBitmaps
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
IsWindowEnabled
ShowWindow
SetWindowTextA
IsDialogMessageA
RegisterWindowMessageA
GetCapture
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
GetFocus
IsWindow
SetFocus
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
BeginDeferWindowPos
EndDeferWindowPos
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
LoadIconA
MapWindowPoints
TrackPopupMenu
GetKeyState
SetForegroundWindow
IsWindowVisible
UpdateWindow
GetClientRect
GetMenu
PostMessageA
GetSubMenu
GetMenuItemID
GetMenuItemCount
GetSysColor
AdjustWindowRectEx
GetParent
ScreenToClient
EqualRect
DeferWindowPos
GetClassInfoA
RegisterClassA
UnregisterClassA
GetDlgCtrlID
SendMessageA
CallWindowProcA
GetWindowLongA
SetWindowLongA
SetWindowPos
GetMenuState
OffsetRect
IntersectRect
IsIconic
GetWindowPlacement
GetWindowRect
GetSystemMetrics
CopyRect
PtInRect
GetWindow
wsprintfA
PeekMessageA
TranslateMessage
DispatchMessageA
SystemParametersInfoA
DefWindowProcA
MessageBoxA
LoadCursorA
EnableWindow
WinHelpA
gdi32
DeleteDC
CreatePatternBrush
CreateCompatibleDC
GetStockObject
CreateSolidBrush
CreateCompatibleBitmap
CreateFontIndirectA
GetTextExtentPoint32A
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetPixel
BitBlt
DeleteObject
GetClipBox
SetTextColor
SetBkColor
GetObjectA
GetDeviceCaps
CreateBitmap
SetMapMode
SaveDC
RestoreDC
SetBkMode
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
ImpersonateSelf
RegQueryValueExA
RegOpenKeyExA
RegDeleteValueA
RegSetValueExA
RegCreateKeyExA
OpenProcessToken
FreeSid
RevertToSelf
RegQueryValueA
RegEnumKeyA
RegOpenKeyA
RegDeleteKeyA
RegCloseKey
OpenThreadToken
AllocateAndInitializeSid
InitializeSecurityDescriptor
GetLengthSid
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
IsValidSecurityDescriptor
AccessCheck
shell32
SHGetSpecialFolderPathA
ShellExecuteA
SHFileOperationW
DragFinish
DragQueryFileA
comctl32
ord17
ImageList_Draw
ImageList_GetImageInfo
ImageList_Destroy
shlwapi
PathFindFileNameA
PathFindExtensionA
SHDeleteKeyW
ole32
StringFromGUID2
CoInitialize
CoCreateInstance
CoUninitialize
oleaut32
VariantChangeType
VariantClear
VariantInit
Sections
.text Size: 176KB - Virtual size: 174KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 174KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE