Static task
static1
Behavioral task
behavioral1
Sample
bbe250a1bdfc1677d5d9298b896f1bce888f241647e5a3ddae42dca8e90492ee.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bbe250a1bdfc1677d5d9298b896f1bce888f241647e5a3ddae42dca8e90492ee.exe
Resource
win10v2004-20220812-en
General
-
Target
bbe250a1bdfc1677d5d9298b896f1bce888f241647e5a3ddae42dca8e90492ee
-
Size
53KB
-
MD5
0f4e8ef58c7b77691b4beadacdb1ebf0
-
SHA1
b9524536a485847bbad70468f39414aa32ed0893
-
SHA256
bbe250a1bdfc1677d5d9298b896f1bce888f241647e5a3ddae42dca8e90492ee
-
SHA512
df6c3e31270677d5c528ee4c6a05cb2ebdeed9f1d591d78eba88538af0191a01d410070eeeffd3a6288565096e00a0a8437fc48d8ff999c8ee6d6122daaa1be8
-
SSDEEP
1536:9cZZ5JILcve8EqTEfyFzxgeeA6TlQQARfbLi:9cZreLGe3oEzQF9
Malware Config
Signatures
Files
-
bbe250a1bdfc1677d5d9298b896f1bce888f241647e5a3ddae42dca8e90492ee.exe windows x86
da2666d3347f129193ab91a0eab85c0c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
DbgPrint
RtlInitUnicodeString
NtOpenKey
NtClose
api-ms-win-core-localregistry-l1-1-0
RegCreateKeyExW
RegDeleteTreeW
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
RegQueryInfoKeyW
api-ms-win-core-processthreads-l1-1-0
SetThreadPriority
GetCurrentThread
CreateThread
GetCurrentProcess
CreateProcessW
OpenProcessToken
user32
CharNextW
GetKeyboardLayout
GetSystemMetrics
ExitWindowsEx
MessageBoxW
LoadStringW
LoadRemoteFonts
DefWindowProcW
RegisterClassExW
DestroyWindow
CreateWindowExW
SystemParametersInfoW
userenv
ord175
msvcrt
_ismbblead
_XcptFilter
_exit
_cexit
exit
_wcsicmp
memset
memmove
_vsnwprintf
_initterm
_acmdln
_amsg_exit
__setusermatherr
__p__fmode
__set_app_type
?terminate@@YAXXZ
_except_handler4_common
_controlfp
__getmainargs
__p__commode
kernel32
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
GetStartupInfoA
InterlockedExchange
LoadLibraryA
RegOpenKeyExA
RegQueryValueExA
ExpandEnvironmentStringsA
LoadLibraryExA
InterlockedCompareExchange
DelayLoadFailureHook
HeapSetInformation
SetCurrentDirectoryW
FormatMessageW
GetFileAttributesExW
GetSystemDirectoryW
SetLastError
ExpandEnvironmentStringsW
GetUserDefaultLangID
SetEvent
OpenEventW
Sleep
WaitForSingleObject
CloseHandle
GetLastError
SetEnvironmentVariableW
SearchPathW
GetCurrentThreadId
CompareFileTime
LoadLibraryW
GetProcAddress
FreeLibrary
GetEnvironmentVariableW
LocalAlloc
LocalFree
GetVersionExW
lstrlenW
Sections
.text Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 28KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
exgcwjk Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE