Static task
static1
Behavioral task
behavioral1
Sample
bf61297bb53edd1ba3a3706fa6cc2ef93331f83b61419c4fe668eca0eff95c5c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
bf61297bb53edd1ba3a3706fa6cc2ef93331f83b61419c4fe668eca0eff95c5c.exe
Resource
win10v2004-20220901-en
General
-
Target
bf61297bb53edd1ba3a3706fa6cc2ef93331f83b61419c4fe668eca0eff95c5c
-
Size
491KB
-
MD5
b9bd2bf6b9ac99e871692c4772064e01
-
SHA1
f62770c0ee25ab398c3f6251aa2bb8fc517fbd00
-
SHA256
bf61297bb53edd1ba3a3706fa6cc2ef93331f83b61419c4fe668eca0eff95c5c
-
SHA512
4bc558523a0d08d9db7fd0b712cfd93c2c5e90885787a69260df2d60372ad17ccf3b5b342553aa85c20df276aa5c767f4074246b58b01bf96830417712ecaa24
-
SSDEEP
6144:FshKBgqJMYucH+Sv2UDn+C0jj3+VAurnVv4Ch9s7cae6ZaKSqeABLs1SWcDDDDk:FshqgqJMaHp27j34GCfs7cafE
Malware Config
Signatures
Files
-
bf61297bb53edd1ba3a3706fa6cc2ef93331f83b61419c4fe668eca0eff95c5c.exe windows x86
2e76f80055bc3e2dcd0b1583d2463dce
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
GetModuleFileNameW
Sleep
GetModuleHandleA
HeapDestroy
CloseHandle
TlsAlloc
DeviceIoControl
lstrlenA
SetEvent
CreateFileMappingW
IsDebuggerPresent
GetDriveTypeA
DeleteFileA
ReleaseMutex
HeapCreate
CloseHandle
IsBadStringPtrW
GetCommandLineA
GetStartupInfoA
user32
IsWindow
IsZoomed
GetIconInfo
CallWindowProcW
DispatchMessageA
DispatchMessageA
GetWindowLongA
DrawTextW
DestroyMenu
FindWindowW
DestroyWindow
PeekMessageA
LoadImageA
cryptext
CryptExtAddPFX
CryptExtAddPFX
CryptExtAddPFX
CryptExtAddPFX
rasapi32
DwCloneEntry
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 416KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 484KB - Virtual size: 483KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ