Static task
static1
Behavioral task
behavioral1
Sample
bff15961c6100bf76db0f20f434cd069.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
bff15961c6100bf76db0f20f434cd069.exe
Resource
win10v2004-20221111-en
General
-
Target
bff15961c6100bf76db0f20f434cd069.exe
-
Size
221KB
-
MD5
bff15961c6100bf76db0f20f434cd069
-
SHA1
7ffcc4359779c74ca2b78526acbfbd147b097de1
-
SHA256
25ae1edc4fb4a251433e427c5ba19bf597e242befe7cb836da692f2cbb2949ed
-
SHA512
f1ec4e7220b65b27456d2d822fd609180d6eb781b08191b7537a972fcbab252ecb41eda85aa85ee783f3eb6fe6cf2c9a5f235eebfbf753af652dded22708d8d6
-
SSDEEP
6144:m8eY52kweddYIRDvxw4rjloyF8ICap6rx:m8efkw+YIRDZGna4
Malware Config
Signatures
Files
-
bff15961c6100bf76db0f20f434cd069.exe.exe windows x86
208d42a9b248c38bd314a7688d20d4a3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FillConsoleOutputCharacterA
EnumSystemCodePagesA
LocalFree
FindNextFileW
WriteConsoleInputW
EnumDateFormatsA
OpenMutexW
CopyFileExW
ReadConsoleOutputCharacterW
SetVolumeLabelA
FatalExit
VerifyVersionInfoW
QueryDosDeviceA
EnumCalendarInfoExW
RequestWakeupLatency
LocalSize
TlsGetValue
CreateFileA
SetMailslotInfo
GetWindowsDirectoryA
GetModuleHandleW
VirtualFree
CreateDirectoryExW
GetLogicalDriveStringsA
WriteConsoleInputA
FindNextVolumeMountPointA
OpenWaitableTimerA
TransactNamedPipe
GetCPInfoExA
SearchPathA
IsSystemResumeAutomatic
CallNamedPipeA
GetProcAddress
LoadLibraryA
GlobalAlloc
MoveFileWithProgressW
GetVolumeInformationW
CancelTimerQueueTimer
CreateTimerQueueTimer
GetConsoleFontSize
FindNextVolumeW
InterlockedIncrement
GetModuleHandleA
GetACP
HeapSetInformation
EnumCalendarInfoW
GetConsoleTitleA
GetPrivateProfileStructW
EnumCalendarInfoA
GetConsoleAliasExesLengthW
InterlockedExchangeAdd
InterlockedDecrement
GetEnvironmentStrings
SetLastError
GetConsoleAliasesLengthW
GetVolumeNameForVolumeMountPointW
SetCalendarInfoA
TerminateThread
MoveFileA
FindAtomW
GetMailslotInfo
FreeEnvironmentStringsW
SetConsoleTitleA
SetVolumeMountPointA
GetAtomNameW
FlushConsoleInputBuffer
GetOEMCP
GetProcessIoCounters
CreateDirectoryExA
GlobalFindAtomW
GetTickCount
GetCommandLineA
LoadLibraryW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
RtlUnwind
GetLastError
DeleteFileA
GetStartupInfoA
HeapAlloc
HeapFree
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
EnterCriticalSection
LeaveCriticalSection
FreeEnvironmentStringsA
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
HeapCreate
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
VirtualAlloc
HeapReAlloc
GetCPInfo
IsValidCodePage
HeapSize
InitializeCriticalSectionAndSpinCount
MultiByteToWideChar
SetFilePointer
GetConsoleCP
GetConsoleMode
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
FlushFileBuffers
ReadFile
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CloseHandle
user32
GetMessageTime
gdi32
GetCharWidth32A
Sections
.text Size: 77KB - Virtual size: 77KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 127KB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ