Static task
static1
Behavioral task
behavioral1
Sample
bd31cf4b2457630bff7b0c6490bd511fd9cf64177df538c9c3983d6773bf3f62.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bd31cf4b2457630bff7b0c6490bd511fd9cf64177df538c9c3983d6773bf3f62.exe
Resource
win10v2004-20221111-en
General
-
Target
bd31cf4b2457630bff7b0c6490bd511fd9cf64177df538c9c3983d6773bf3f62
-
Size
313KB
-
MD5
abe49871481077e08dccb55b9172c7cb
-
SHA1
28ff73459f9844cc90dee9520292008b0ba4bd30
-
SHA256
bd31cf4b2457630bff7b0c6490bd511fd9cf64177df538c9c3983d6773bf3f62
-
SHA512
eb474cc576e5b5d9365ebc031b20aeac4f239c4b99c38d8e0270668f85085958fb6c833129cc45ca2e801d8327cb277eed1bcc8b84a10e72f7b647ad06980e49
-
SSDEEP
3072:Dx1KlSI48KuhXLBSsfQK5TcRz06J0TZGuk1e/xDvcaDNgKkpXfuVgLlSxHa:DvKlr7lh0GcRTMGurBEaGK8WgAx6
Malware Config
Signatures
Files
-
bd31cf4b2457630bff7b0c6490bd511fd9cf64177df538c9c3983d6773bf3f62.exe windows x86
ba105673c4dee53cbbe8a5d9d25c3096
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_REMOVABLE_RUN_FROM_SWAP
Imports
kernel32
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
HeapSize
HeapReAlloc
GetLocaleInfoW
GetStringTypeW
IsValidCodePage
GetOEMCP
GetACP
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameW
CloseHandle
SetFilePointer
ReadFile
GetProcessHeaps
GetProcessHeap
HeapAlloc
HeapFree
FormatMessageA
ExitProcess
lstrcpyA
FindResourceA
LoadResource
SizeofResource
HeapCreate
lstrcatA
QueryPerformanceFrequency
QueryPerformanceCounter
lstrcmpA
MulDiv
WriteConsoleW
GetLastError
FlushFileBuffers
GetConsoleMode
GetConsoleCP
WriteFile
GetCurrentProcess
TerminateProcess
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetFileType
InitializeCriticalSectionAndSpinCount
GetStdHandle
SetHandleCount
GetCurrentThreadId
SetLastError
GetModuleHandleW
TlsFree
TlsSetValue
TlsGetValue
LockResource
LoadLibraryW
SetConsoleTitleA
LoadLibraryA
GetProcAddress
TlsAlloc
IsProcessorFeaturePresent
GetCPInfo
MultiByteToWideChar
LCMapStringW
WideCharToMultiByte
GetStartupInfoW
HeapSetInformation
GetCommandLineA
RtlUnwind
RaiseException
SetStdHandle
CreateFileA
CreateFileW
GetModuleFileNameA
DecodePointer
EncodePointer
LeaveCriticalSection
EnterCriticalSection
InterlockedIncrement
InterlockedDecrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
SetEndOfFile
user32
GetWindowRect
SetWindowPos
SystemParametersInfoA
GetSystemMetrics
IsWindowVisible
DialogBoxParamA
FillRect
GetClientRect
SetWindowTextA
GetWindowTextLengthA
GetWindowTextA
GetFocus
CopyImage
DialogBoxParamW
LoadStringW
LoadImageW
ShowWindow
SendMessageA
CreateWindowExA
SendDlgItemMessageA
EnableMenuItem
SetMenuItemInfoW
DefWindowProcA
SetRect
ScreenToClient
GetDlgItemInt
gdi32
GetCharWidthA
CreateFontIndirectA
DeleteObject
ExcludeClipRect
CreateSolidBrush
SelectClipRgn
GetStockObject
SelectObject
SetDCPenColor
Rectangle
GetObjectA
CreatePen
Pie
RestoreDC
advapi32
RegQueryValueExW
RegOpenKeyW
RegCloseKey
shell32
SHGetFileInfoA
ShellAboutW
ole32
CoInitialize
ws2_32
inet_addr
WSAStartup
msacm32
acmStreamUnprepareHeader
acmStreamOpen
acmStreamPrepareHeader
acmStreamClose
winmm
mmioWrite
mmioCreateChunk
mmioAscend
mmioRead
mmioClose
mmioDescend
mmioOpenW
iphlpapi
GetIpNetTable
GetAdaptersInfo
comctl32
ImageList_Destroy
ord17
ImageList_Create
gdiplus
GdipCreateBitmapFromHBITMAP
GdiplusStartup
GdipSaveImageToFile
GdipDisposeImage
secur32
QueryContextAttributesA
FreeContextBuffer
QuerySecurityPackageInfoA
imm32
ImmGetOpenStatus
ImmSetOpenStatus
ImmReleaseContext
ImmGetContext
rasdlg
RasDialDlgA
traffic
TcEnumerateFlows
Sections
.text Size: 248KB - Virtual size: 247KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ