Static task
static1
Behavioral task
behavioral1
Sample
ba0f7d0d678a4c3cb89b92ee99373bb70a3628dd939e1a9ad7761ab02e1b68cb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ba0f7d0d678a4c3cb89b92ee99373bb70a3628dd939e1a9ad7761ab02e1b68cb.exe
Resource
win10v2004-20220901-en
General
-
Target
ba0f7d0d678a4c3cb89b92ee99373bb70a3628dd939e1a9ad7761ab02e1b68cb
-
Size
105KB
-
MD5
0d1b4a04ad52c3a4ab4c17a81b99eaac
-
SHA1
1be1cc1f72c1e3990d47f3af70e330b5f2b9fa36
-
SHA256
ba0f7d0d678a4c3cb89b92ee99373bb70a3628dd939e1a9ad7761ab02e1b68cb
-
SHA512
e19adae7248505a2f2fe50e9c5800c5cb3c23d116c0d98b969f9092291daee81bf4edbd07ca8ca1636044bc8e789178a768eb266fe978750ce5cbf0dd51160f3
-
SSDEEP
1536:MlLm+z+HyX2AqbAsdoRX6Etjx6QVLPJOKw2Ry0idvotxjJ1G8Va:qG6jqbnctjxDVrJOaFleH
Malware Config
Signatures
Files
-
ba0f7d0d678a4c3cb89b92ee99373bb70a3628dd939e1a9ad7761ab02e1b68cb.exe windows x86
84be63109c368e689b34a5a61c9af66a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
InterlockedIncrement
RaiseException
TerminateProcess
SetHandleCount
WriteConsoleA
FileTimeToDosDateTime
SetUnhandledExceptionFilter
GetVersion
GetModuleHandleA
lstrcmpA
FreeEnvironmentStringsW
VirtualProtect
LocalFileTimeToFileTime
lstrcatA
SetFileTime
SetStdHandle
FormatMessageA
GetVersionExA
GetLocaleInfoA
GlobalFree
GetThreadLocale
GetFileAttributesA
CreateProcessA
DeleteFileA
GetSystemTime
GetCurrentProcess
IsValidCodePage
CompareStringW
GetUserDefaultLangID
FlushFileBuffers
GetCommandLineW
FileTimeToSystemTime
GetExitCodeProcess
LoadResource
lstrlenW
GetEnvironmentStringsW
CreateProcessW
UnhandledExceptionFilter
QueryPerformanceCounter
GetTempPathA
GlobalAlloc
GetTempFileNameA
GetModuleHandleW
GetWindowsDirectoryA
CreateFileMappingA
GetUserDefaultLCID
DeleteFileW
GetCurrentProcessId
GlobalLock
GetModuleFileNameA
SetLastError
lstrcpyA
GetEnvironmentVariableA
SetErrorMode
IsDebuggerPresent
IsBadReadPtr
IsBadCodePtr
GetLocalTime
lstrcpynA
LCMapStringA
GetFullPathNameA
msvcrt
_exit
_XcptFilter
__p__fmode
_adjust_fdiv
__set_app_type
__setusermatherr
__p___initenv
_controlfp
__p__commode
__getmainargs
_initterm
_except_handler3
user32
CharLowerA
EndPaint
SetScrollInfo
PtInRect
RemovePropA
CallNextHookEx
GetFocus
ScrollWindow
GetCursorPos
EndDialog
GetIconInfo
GetScrollInfo
CreateMenu
InvalidateRect
GetLastActivePopup
InflateRect
DialogBoxParamA
SetActiveWindow
MapWindowPoints
GetSystemMenu
UnregisterClassA
GetDC
ClientToScreen
GetMenuState
GetClientRect
DrawIconEx
IsDialogMessageA
SetPropA
GetDlgItem
GetMenu
GetMenuStringA
WinHelpA
RedrawWindow
DrawMenuBar
PostMessageA
GetWindowRect
CallWindowProcA
ReleaseDC
GetActiveWindow
GetWindow
SetRect
MessageBeep
GetSubMenu
advapi32
ControlService
RegSetValueExA
RegQueryValueExA
DeregisterEventSource
RegEnumKeyExA
RegEnumValueW
RegDeleteValueW
GetLengthSid
AdjustTokenPrivileges
AddAccessAllowedAce
GetTokenInformation
RegOpenKeyExW
CryptHashData
SetSecurityDescriptorDacl
RevertToSelf
RegOpenKeyW
RegQueryInfoKeyA
RegDeleteValueA
RegCloseKey
CloseServiceHandle
RegQueryValueA
RegSetValueExW
RegQueryInfoKeyW
RegEnumKeyExW
RegOpenKeyA
CheckTokenMembership
AllocateAndInitializeSid
CryptGenRandom
DeleteService
Sections
.text Size: 1024B - Virtual size: 780B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ