Static task
static1
Behavioral task
behavioral1
Sample
bdfc157097653d0cbbee13354352a3effe17f4c7752079c4805a10addc8629e3.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
bdfc157097653d0cbbee13354352a3effe17f4c7752079c4805a10addc8629e3.exe
Resource
win10v2004-20220901-en
General
-
Target
bdfc157097653d0cbbee13354352a3effe17f4c7752079c4805a10addc8629e3
-
Size
142KB
-
MD5
0573e8f3f6f194c7f360a3a6a0bc2be0
-
SHA1
02e9628fadf09e8afa169dcc8a3fe949931856e4
-
SHA256
bdfc157097653d0cbbee13354352a3effe17f4c7752079c4805a10addc8629e3
-
SHA512
ef650ca942960b72d022e3f85b83a0c7cd85b9cfabb0705720243cd748589ba3971618304d3bb737604532cbe85de1c7090da80ea9d80cff881d2c442a6f0fd1
-
SSDEEP
3072:Vaq82l3+eQDrCGixhhFj2yipKaT+Z7Xxzc9c1:sqjl37Q415ipDqtB3
Malware Config
Signatures
Files
-
bdfc157097653d0cbbee13354352a3effe17f4c7752079c4805a10addc8629e3.exe windows x86
b70ac76d9b1ceb36bdb6477c62505b71
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemTimeAsFileTime
HeapAlloc
HeapFree
EnterCriticalSection
LeaveCriticalSection
ExitProcess
GetProcAddress
GetModuleHandleA
TerminateProcess
GetCurrentProcess
GetModuleFileNameA
HeapReAlloc
GetCommandLineA
GetVersionExA
WideCharToMultiByte
GetTimeZoneInformation
DeleteCriticalSection
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
GetLastError
WriteFile
FlushFileBuffers
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
TlsFree
SetLastError
GetCurrentThreadId
TlsSetValue
TlsGetValue
TlsAlloc
LCMapStringA
MultiByteToWideChar
LCMapStringW
CloseHandle
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
FindNextFileA
FindFirstFileA
FindClose
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetFilePointer
CreateFileA
InitializeCriticalSection
VirtualProtect
GetSystemInfo
VirtualQuery
SetStdHandle
HeapSize
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
RtlUnwind
ReadFile
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
CompareStringA
CompareStringW
SetEnvironmentVariableA
SetEndOfFile
GetDriveTypeA
GetCurrentDirectoryA
GetFullPathNameA
FileTimeToSystemTime
FileTimeToLocalFileTime
Sections
.text Size: 84KB - Virtual size: 83KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 22KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE