Static task
static1
Behavioral task
behavioral1
Sample
bd2df9c2540897fb521850dba06585e5d26a13d731f9f546e75599397228224b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bd2df9c2540897fb521850dba06585e5d26a13d731f9f546e75599397228224b.exe
Resource
win10v2004-20220901-en
General
-
Target
bd2df9c2540897fb521850dba06585e5d26a13d731f9f546e75599397228224b
-
Size
811KB
-
MD5
0841cb2e406d3b74764ea219f8779f66
-
SHA1
8cdea130deee2556cfdf282be8ea1d17ff58d8bd
-
SHA256
bd2df9c2540897fb521850dba06585e5d26a13d731f9f546e75599397228224b
-
SHA512
a9dd8cc007bbdcd6f80c75ac8368703441a7eed78cfcc781c0fe6808fc0f14c1c66bfbeef1a4d01c9089ddd21128b8d1bec0f69216885e3ed637d1a2983b3c3a
-
SSDEEP
24576:36oM+tUENX/9er1UgDbMAzP/NT+3+ZSM:W++ERqHvnNth
Malware Config
Signatures
Files
-
bd2df9c2540897fb521850dba06585e5d26a13d731f9f546e75599397228224b.exe windows x86
195079c04c953afd3bf37b172ffe959f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetEnvironmentStringsA
CreateSemaphoreW
SetEvent
CreateDirectoryW
DeleteFileA
GetFileSize
OpenSemaphoreA
CloseHandle
SetLocalTime
GetModuleFileNameA
SetLastError
Sleep
GetFileAttributesW
GetProcessHeap
SetLastError
GetStartupInfoA
GetTickCount
lstrlenA
GlobalFree
LoadLibraryA
HeapSize
VirtualProtect
WriteConsoleA
CreateFileA
ReadConsoleA
user32
GetClassInfoA
GetSysColor
IsZoomed
DestroyMenu
DispatchMessageA
GetWindowLongA
DrawTextW
DispatchMessageA
IsWindow
PeekMessageA
FindWindowA
CallWindowProcW
SetFocus
xmlprovi
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
advapi32
RegCloseKey
Sections
.text Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 800KB - Virtual size: 2.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE