Static task
static1
Behavioral task
behavioral1
Sample
bc77bf0cc6b1efd3f10458f398719b7db5a93ba78ea61bbe9e3831a423e6aa2d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
bc77bf0cc6b1efd3f10458f398719b7db5a93ba78ea61bbe9e3831a423e6aa2d.exe
Resource
win10v2004-20220812-en
General
-
Target
bc77bf0cc6b1efd3f10458f398719b7db5a93ba78ea61bbe9e3831a423e6aa2d
-
Size
80KB
-
MD5
5fce64eb222aa41e4fb967e9d8fb6a22
-
SHA1
c2c980297d985c0e62e461b76fa584e79a6b3822
-
SHA256
bc77bf0cc6b1efd3f10458f398719b7db5a93ba78ea61bbe9e3831a423e6aa2d
-
SHA512
35fa7f7ec6339700febba68d30ca17554a926bb8011f1345609689460399f2a2d7c7d0d027db0b8e22df546dbc89b8c03bc127c3a72c304cfc1354a598f3ccac
-
SSDEEP
768:pZxqi0P+d1QgdggdoXL8X7FqTLaIixHOtIlYFK1Zk6YayZek31s8gJeIdcE6t7Sy:3w+d/WXLDLFrce6lyZhq8CuE6tvn
Malware Config
Signatures
Files
-
bc77bf0cc6b1efd3f10458f398719b7db5a93ba78ea61bbe9e3831a423e6aa2d.exe windows x86
a2fb10bfd66628fb52fcb13ad2df00b1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
ntdll
wcscpy
strcspn
wcstoul
strcat
sprintf
_chkstk
urlmon
CompareSecurityIds
FindMimeFromData
HlinkGoBack
mprapi
MprAdminMIBEntrySet
MprConfigInterfaceCreate
MprInfoRemoveAll
msvcrt
setlocale
calloc
vfprintf
wcstod
mblen
fopen
fprintf
free
wcsxfrm
rewind
gdi32
CreateDIBPatternBrushPt
user32
GetLastActivePopup
EnumDisplayDevicesW
InSendMessageEx
FindWindowExA
GetClassLongA
clusapi
GetClusterFromNetInterface
kernel32
LocalAlloc
EnumResourceNamesA
GetVolumeNameForVolumeMountPointA
SetComputerNameA
ReadConsoleOutputA
GetSystemTimeAdjustment
SetSystemTime
FreeEnvironmentStringsA
FreeLibrary
WriteConsoleOutputA
FreeEnvironmentStringsW
LoadLibraryA
GetCommConfig
FindClose
CancelTimerQueueTimer
FormatMessageA
GetCurrentDirectoryA
FindNextVolumeA
Module32FirstW
SearchPathA
SetCriticalSectionSpinCount
InterlockedExchange
HeapLock
FlushConsoleInputBuffer
GetNativeSystemInfo
GetSystemInfo
DecodeSystemPointer
GetTempPathA
GetConsoleFontSize
WriteProfileStringA
GetSystemInfo
GetModuleHandleA
GetLastError
ExitThread
GetCurrentThread
MoveFileExW
GlobalAlloc
RegisterWaitForSingleObjectEx
SetTimerQueueTimer
PeekConsoleInputA
SetMessageWaitingIndicator
GetComputerNameExA
MoveFileA
GetLongPathNameW
VirtualAlloc
AddRefActCtx
Thread32Next
VerifyVersionInfoA
GetProcessPriorityBoost
GetSystemWindowsDirectoryW
GetACP
GetTempFileNameA
GetCompressedFileSizeW
GetThreadLocale
AssignProcessToJobObject
GetFileAttributesW
HeapReAlloc
AddVectoredExceptionHandler
VirtualProtect
RaiseException
GetSystemDefaultUILanguage
ReadConsoleOutputW
SetEnvironmentVariableA
SetMailslotInfo
SetConsoleTitleW
GetDriveTypeW
FindResourceA
GetUserDefaultUILanguage
QueueUserWorkItem
SetConsoleCursorInfo
IsDBCSLeadByteEx
ChangeTimerQueueTimer
TlsSetValue
GetConsoleMode
AllocConsole
SwitchToThread
WriteTapemark
FormatMessageW
HeapCreate
GlobalUnfix
VirtualQuery
GlobalDeleteAtom
WaitNamedPipeA
GetPrivateProfileSectionNamesW
ReadFileScatter
GetFileInformationByHandle
GetProcAddress
DebugBreakProcess
SetFirmwareEnvironmentVariableA
oleaut32
VarR4FromCy
VarUI2FromR4
VarR4CmpR8
Sections
.text Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.fake Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ