Static task
static1
Behavioral task
behavioral1
Sample
bc81265a8dd40a15c1e25ec5ee81b2d6757fedda69b14d109e02266e575216b3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bc81265a8dd40a15c1e25ec5ee81b2d6757fedda69b14d109e02266e575216b3.exe
Resource
win10v2004-20220812-en
General
-
Target
bc81265a8dd40a15c1e25ec5ee81b2d6757fedda69b14d109e02266e575216b3
-
Size
491KB
-
MD5
2122cd83d6ad8cf060d54cd154f7a266
-
SHA1
88e8cb92ff13bedfe1437948b7135bc069252341
-
SHA256
bc81265a8dd40a15c1e25ec5ee81b2d6757fedda69b14d109e02266e575216b3
-
SHA512
c64ed55925c5a6b204f8f1f3b8717fbefd29541a7e2402775a6d5ee7eb188a872c3573d788c0581668b303701d97c133e09db6a3868dd75b864cdbd617f85b02
-
SSDEEP
6144:oRh0hKBgqJMYucH+Sv2UDn+C0jj3+VAurnVv4Ch9s7cae6ZaKSqeABLs1SWcDDDz:qehqgqJMaHp27j34GCfs7cafE
Malware Config
Signatures
Files
-
bc81265a8dd40a15c1e25ec5ee81b2d6757fedda69b14d109e02266e575216b3.exe windows x86
97a2743a58e5de61aa0014f36b7dd94a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
ReleaseMutex
GetModuleHandleA
Sleep
CreateFileA
CreateFileMappingW
DeleteFileA
IsBadStringPtrW
CloseHandle
lstrlenA
TlsAlloc
HeapCreate
IsDebuggerPresent
SetEvent
HeapDestroy
GetDriveTypeA
GetCommandLineA
DeviceIoControl
GetModuleFileNameW
GetStartupInfoA
user32
GetIconInfo
IsZoomed
DrawTextW
LoadImageA
CallWindowProcW
DestroyWindow
DispatchMessageA
PeekMessageA
DestroyMenu
GetWindowLongA
IsWindow
DispatchMessageA
FindWindowW
cryptext
CryptExtAddPFX
CryptExtAddPFX
CryptExtAddPFX
CryptExtAddPFX
rasapi32
DwCloneEntry
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 416KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 484KB - Virtual size: 483KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ