Static task
static1
Behavioral task
behavioral1
Sample
bd48b57218c72a5b546238718bb0085830a9c2c56ce0a9bdfb3cb3c94c59bd3c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bd48b57218c72a5b546238718bb0085830a9c2c56ce0a9bdfb3cb3c94c59bd3c.exe
Resource
win10v2004-20220812-en
General
-
Target
bd48b57218c72a5b546238718bb0085830a9c2c56ce0a9bdfb3cb3c94c59bd3c
-
Size
467KB
-
MD5
be67d6d1b016059aa01f96e7f6596964
-
SHA1
cb02ad776287f43c2624849a3e22e51b44e0e130
-
SHA256
bd48b57218c72a5b546238718bb0085830a9c2c56ce0a9bdfb3cb3c94c59bd3c
-
SHA512
6a9f07e478386926f69e68adac87a8d95ccb803ee78fa49dc421749d3a35c249097fb9847f82f2a79fab3558b69100fa474c37d5132c9466402902c53b0f7eef
-
SSDEEP
12288:Ce6XllJyVZXcdwajTec1/p3ILJoRSLBl2VvbNC4tYr:fIllJ2Zsdw+/p4dfr2RbNCAY
Malware Config
Signatures
Files
-
bd48b57218c72a5b546238718bb0085830a9c2c56ce0a9bdfb3cb3c94c59bd3c.exe windows x86
841eb6a2a251ab235d8899a50eac727f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExpandEnvironmentStringsW
SetFileAttributesW
MultiByteToWideChar
GetEnvironmentVariableA
GetFileAttributesW
GetVolumeInformationA
GetWindowsDirectoryA
CreateDirectoryW
WideCharToMultiByte
Sleep
FreeLibrary
CreateProcessW
HeapAlloc
GetCurrentProcess
HeapFree
WaitForSingleObject
GetModuleHandleW
GetProcessHeap
OpenProcess
LoadLibraryW
GetVersionExW
TerminateProcess
GetLastError
GetProcAddress
LoadLibraryA
DuplicateHandle
CloseHandle
GetCurrentProcessId
LocalFree
InterlockedIncrement
InterlockedDecrement
CreateMutexW
ReleaseMutex
CreateFileA
FindFirstFileW
MoveFileExW
GetFileAttributesA
CreateDirectoryA
RemoveDirectoryA
CopyFileA
SetFileAttributesA
FindClose
MoveFileA
GetModuleFileNameA
FindNextFileW
DeleteFileW
DeleteFileA
GetPrivateProfileStringW
WritePrivateProfileStringW
WriteFile
CreateFileW
GetTickCount
GlobalAlloc
GlobalFree
DeviceIoControl
GetFileSize
ReadFile
lstrlenW
CreateProcessA
GetStartupInfoA
SetFilePointer
PeekNamedPipe
WaitForMultipleObjects
CreatePipe
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
CreateEventW
ResetEvent
SetEvent
InterlockedExchange
CreateEventA
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
GetExitCodeThread
GetCurrentThreadId
DosDateTimeToFileTime
SystemTimeToFileTime
SetFileTime
GetCurrentDirectoryW
GetFileType
InterlockedCompareExchange
InitializeCriticalSection
GetSystemTimeAsFileTime
GetStartupInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
ExitThread
CreateThread
RaiseException
RtlUnwind
GetCPInfo
LCMapStringA
LCMapStringW
GetStringTypeW
SetLastError
GetACP
GetOEMCP
IsValidCodePage
ExitProcess
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
HeapCreate
VirtualFree
QueryPerformanceCounter
HeapSize
VirtualAlloc
HeapReAlloc
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetStringTypeA
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetModuleHandleA
GetLocaleInfoW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
SetEndOfFile
winhttp
WinHttpCrackUrl
WinHttpOpenRequest
WinHttpOpen
WinHttpQueryDataAvailable
WinHttpQueryHeaders
WinHttpCloseHandle
WinHttpConnect
WinHttpSendRequest
WinHttpSetTimeouts
WinHttpReceiveResponse
WinHttpReadData
psapi
EnumProcessModules
GetModuleBaseNameW
setupapi
CM_Reenumerate_DevNode
SetupDiGetClassDevsW
CM_Locate_DevNodeW
SetupDiGetDeviceInfoListDetailW
SetupDiGetDeviceInstanceIdW
CMP_WaitNoPendingInstallEvents
SetupDiGetDeviceRegistryPropertyW
SetupDiDestroyDeviceInfoList
SetupDiEnumDeviceInfo
ws2_32
ntohs
shlwapi
PathFileExistsW
user32
RegisterClassW
CreateWindowExW
ShowWindow
SetWindowLongW
GetWindowLongW
LoadCursorW
wvsprintfW
wsprintfW
CallWindowProcW
DefWindowProcW
DestroyWindow
SetTimer
PostQuitMessage
PostMessageW
KillTimer
RegisterDeviceNotificationW
UnregisterDeviceNotification
FindWindowW
GetMessageW
TranslateMessage
IsWindow
FindWindowExW
DispatchMessageW
SendMessageW
advapi32
SetEntriesInAclW
OpenProcessToken
GetTokenInformation
LookupPrivilegeValueW
AdjustTokenPrivileges
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
CheckTokenMembership
FreeSid
AllocateAndInitializeSid
RegOpenKeyExW
RegEnumValueW
QueryServiceStatus
SetSecurityInfo
RegQueryInfoKeyW
RegQueryValueExW
OpenServiceW
OpenSCManagerW
CloseServiceHandle
RegCloseKey
RegCreateKeyExA
RegSetValueExA
shell32
SHGetSpecialFolderPathA
ShellExecuteExW
SHGetSpecialFolderPathW
Sections
.text Size: 379KB - Virtual size: 378KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 57KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ