Static task
static1
Behavioral task
behavioral1
Sample
be1374aa6515a8f00260f0280626e2fec86675f3c4cf70c102734b86532f6c0a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
be1374aa6515a8f00260f0280626e2fec86675f3c4cf70c102734b86532f6c0a.exe
Resource
win10v2004-20220812-en
General
-
Target
be1374aa6515a8f00260f0280626e2fec86675f3c4cf70c102734b86532f6c0a
-
Size
356KB
-
MD5
06f1e27f810b6eb6a1e429633dd9b3b0
-
SHA1
d941801ab733cb087c79a8e7081513b03ea4f226
-
SHA256
be1374aa6515a8f00260f0280626e2fec86675f3c4cf70c102734b86532f6c0a
-
SHA512
a4521998e5aa550d9c8c4d3e59d848fade131c2198b5a45275c9ceb00304b3fad90f3a2ae6dea5619b7dd442f6e06457ac4f96a81e793340e26ad6dcd2703b1f
-
SSDEEP
6144:UXlmCdvCZOeOyi/UlpKJNv0h6VWipyD3v5q9L/Fy62cQFT3hFsFiCIlS:elmCEOeA/UnKrv5WipK3I9jFZ2VT3hFL
Malware Config
Signatures
Files
-
be1374aa6515a8f00260f0280626e2fec86675f3c4cf70c102734b86532f6c0a.exe windows x86
dbc7a2b55901652cdbfaa184cb944a1c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OpenFileMappingW
SetHandleCount
FileTimeToSystemTime
SetProcessShutdownParameters
CreateEventW
GetModuleHandleW
IsBadWritePtr
GetPrivateProfileSectionNamesA
GetACP
GetThreadSelectorEntry
TryEnterCriticalSection
SetCommMask
GetFullPathNameW
DeleteFiber
CreateConsoleScreenBuffer
FindFirstChangeNotificationA
GetLogicalDriveStringsA
GetPrivateProfileIntA
lstrcpynW
SearchPathW
CreateFileMappingA
GetComputerNameA
GetDriveTypeW
WriteFile
DuplicateHandle
GetEnvironmentVariableA
WriteProcessMemory
SuspendThread
SetCommBreak
CloseHandle
lstrcatA
GetProcessVersion
GetFileSize
GetOEMCP
AllocConsole
PulseEvent
SetConsoleTitleA
LocalLock
GetVersionExA
VirtualProtect
GetModuleHandleA
SwitchToThread
VirtualUnlock
IsDBCSLeadByteEx
SetThreadIdealProcessor
Beep
VirtualAlloc
FileTimeToLocalFileTime
lstrcpyW
CompareStringW
WriteFileGather
ScrollConsoleScreenBufferA
CreateDirectoryA
ExpandEnvironmentStringsW
AddAtomA
WideCharToMultiByte
TransactNamedPipe
GetLocaleInfoA
LocalFileTimeToFileTime
DosDateTimeToFileTime
SetThreadAffinityMask
FindCloseChangeNotification
SetupComm
GetTempPathA
SetPriorityClass
CreateFileA
SetSystemTime
ClearCommError
GlobalAlloc
TlsSetValue
TlsFree
OutputDebugStringA
EnumResourceLanguagesA
FillConsoleOutputCharacterA
ScrollConsoleScreenBufferW
EnumResourceNamesA
GetOverlappedResult
UnlockFile
SetUnhandledExceptionFilter
FlushInstructionCache
WaitCommEvent
ReadFileScatter
OpenFile
LocalSize
GetStartupInfoA
GetFileAttributesW
DeleteFileA
GlobalFlags
CreatePipe
GetThreadLocale
user32
SetWindowWord
CharLowerBuffA
GetWindowRect
DefDlgProcW
DialogBoxIndirectParamA
GetWindowTextW
GetWindowContextHelpId
SubtractRect
LoadImageW
GetActiveWindow
ExcludeUpdateRgn
GetCapture
SetClassLongA
MessageBoxW
SetWindowTextA
TranslateMessage
GetMenuCheckMarkDimensions
DefFrameProcA
GetKeyNameTextW
MsgWaitForMultipleObjectsEx
DestroyWindow
DefWindowProcW
wsprintfA
SetMessageQueue
GrayStringW
GetUpdateRect
LoadAcceleratorsW
CharLowerBuffW
GetNextDlgTabItem
EnumDisplaySettingsA
LoadMenuIndirectA
CharNextA
RedrawWindow
MessageBeep
ToAscii
GetClassLongA
SetMenuItemInfoA
SetMenuInfo
SetScrollInfo
OpenDesktopA
EndDeferWindowPos
UnhookWindowsHook
EnumDesktopsA
CheckRadioButton
IsRectEmpty
SetPropA
EnableScrollBar
GetDlgItemInt
MessageBoxA
ArrangeIconicWindows
GetScrollPos
UnregisterDeviceNotification
GetSystemMenu
CountClipboardFormats
GetClassNameW
SetWindowLongW
UnhookWinEvent
SetClipboardViewer
LoadMenuIndirectW
gdi32
GetDCOrgEx
SetTextCharacterExtra
CopyMetaFileA
GetStockObject
CreateEnhMetaFileA
GetRegionData
GetCharWidth32W
CreateBitmap
ExtTextOutW
GetSystemPaletteEntries
comdlg32
ChooseColorA
ReplaceTextW
advapi32
RegLoadKeyW
DeleteService
GetNamedSecurityInfoA
RegQueryValueW
RegSetValueW
LookupAccountSidW
RegEnumValueA
QueryServiceStatus
RegOpenKeyExW
RegConnectRegistryA
DuplicateToken
BuildTrusteeWithSidW
AccessCheckAndAuditAlarmA
RegEnumKeyW
NotifyChangeEventLog
RegEnumKeyExA
DeregisterEventSource
RegisterServiceCtrlHandlerW
AddAccessDeniedAce
RegRestoreKeyW
BuildTrusteeWithNameW
SetEntriesInAclA
EnumServicesStatusW
CryptSetProvParam
GetUserNameW
GetServiceDisplayNameA
GetFileSecurityW
RegCreateKeyW
AbortSystemShutdownA
LookupPrivilegeDisplayNameA
GetSecurityDescriptorLength
shell32
DragQueryFileA
DragAcceptFiles
ShellAboutW
ExtractAssociatedIconW
ole32
CoTaskMemAlloc
FreePropVariantArray
DoDragDrop
StgOpenStorageOnILockBytes
CoCreateGuid
CoMarshalInterface
CoGetObject
RevokeDragDrop
oleaut32
CreateErrorInfo
SafeArrayCreateVector
SysAllocStringLen
SafeArrayGetLBound
RegisterTypeLi
DispGetIDsOfNames
comctl32
ImageList_Replace
ImageList_Duplicate
ImageList_DrawEx
CreateToolbarEx
shlwapi
StrCmpNW
SHSetThreadRef
SHRegOpenUSKeyW
StrCatBuffA
PathQuoteSpacesA
PathIsRelativeW
StrStrIA
PathFileExistsA
PathRelativePathToW
PathAppendW
PathRemoveArgsW
PathRemoveBackslashW
StrCmpW
StrFormatByteSizeA
SHDeleteKeyA
PathGetDriveNumberW
setupapi
SetupDiGetDeviceInstanceIdA
SetupDiGetClassDescriptionExA
SetupDiEnumDriverInfoA
SetupDiCallClassInstaller
SetupOpenLog
SetupGetLineTextA
SetupGetLineCountA
SetupDiDestroyDriverInfoList
SetupDiDeleteDeviceInfo
SetupDiGetClassDevsA
msvcrt
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
Sections
.text Size: 308KB - Virtual size: 305KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 36KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE