Static task
static1
Behavioral task
behavioral1
Sample
bca4a675b30ada8c0bb505a518ab045d43105ab7f0362bc4277e9876db5e74a5.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
bca4a675b30ada8c0bb505a518ab045d43105ab7f0362bc4277e9876db5e74a5.exe
Resource
win10v2004-20220812-en
General
-
Target
bca4a675b30ada8c0bb505a518ab045d43105ab7f0362bc4277e9876db5e74a5
-
Size
148KB
-
MD5
072b81e7bdb6d5ca0570f13bd0bfac90
-
SHA1
85fa6194177073f41a37ef7116ce38c20c5aabc4
-
SHA256
bca4a675b30ada8c0bb505a518ab045d43105ab7f0362bc4277e9876db5e74a5
-
SHA512
d6c9300d123e2fd8c52db49118b64435cb9a65644095a9efb588add54e77f9fda6760cb0767c148853519b8ecd0d6bbb937b1e6dacbec5547a00dd3436033b89
-
SSDEEP
1536:XYoo9TE4MdAaRSkJc2kxrFhUIqnCZXz3AJXUn3UCH4R7qjh3rmKPN:X6/MdtEhURJXUnEM4EjZqMN
Malware Config
Signatures
Files
-
bca4a675b30ada8c0bb505a518ab045d43105ab7f0362bc4277e9876db5e74a5.exe windows x86
94ba6b81141dcc234f355243a2aedcc3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileAttributesW
GetModuleFileNameW
GetModuleHandleW
GetPrivateProfileIntW
GetPrivateProfileStringW
GetStringTypeExW
GetSystemDirectoryW
GetTempFileNameW
GetTempPathW
GetTimeFormatW
GetVersionExW
LoadLibraryExW
lstrcatW
GetProfileStringW
lstrcpyW
lstrcpynW
OpenEventW
OpenFileMappingW
SearchPathW
UnmapViewOfFile
SetEvent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetLocaleInfoA
GetNumberFormatA
OpenEventA
lstrcmpW
LocalAlloc
LocalFree
LoadResource
LockResource
WaitForSingleObject
lstrlenA
GetModuleHandleA
GetCurrentProcessId
MapViewOfFile
GetLastError
LoadLibraryExA
DeviceIoControl
GetCurrentThreadId
CreateThread
Sleep
SetCurrentDirectoryW
lstrlenW
LoadLibraryW
GetProcessHeap
HeapFree
OpenProcess
lstrcmpiW
SetProcessWorkingSetSize
GetExitCodeProcess
CloseHandle
GetTickCount
GetProcAddress
FreeLibrary
WritePrivateProfileStringW
GetDateFormatW
FindResourceExW
ExpandEnvironmentStringsW
DeleteFileW
CreateProcessW
CreateMutexW
CreateFileMappingW
CreateFileW
CreateEventW
CreateDirectoryW
CompareStringW
GetVersionExA
CreateEventA
GetStartupInfoA
user32
GetWindowTextW
GetWindowTextLengthW
InsertMenuW
EndDialog
SetForegroundWindow
GetLastActivePopup
EnableWindow
ShowWindow
TrackPopupMenu
SetMenuDefaultItem
DestroyWindow
GetCursorPos
SetWindowPos
SystemParametersInfoA
GetWindowRect
IsWindowVisible
IsWindow
MsgWaitForMultipleObjects
GetDlgCtrlID
ChildWindowFromPointEx
ScreenToClient
GetDlgItem
SetDlgItemTextA
GetParent
EnumThreadWindows
GetWindowThreadProcessId
DestroyMenu
GetMenuItemCount
wvsprintfW
wsprintfW
WinHelpW
UnregisterClassW
SetWindowTextW
SetWindowLongW
SetDlgItemTextW
RegisterClassExW
LoadStringW
LoadMenuW
LoadImageW
LoadIconW
LoadCursorW
wsprintfA
GetSubMenu
GetWindowLongW
GetDlgItemTextW
GetClassLongW
FindWindowExW
DialogBoxParamW
DefWindowProcW
CreateWindowExW
CreateDialogParamW
CharUpperW
CharNextW
CharPrevW
CharLowerW
CallWindowProcW
IsCharAlphaA
advapi32
ImpersonateLoggedOnUser
RevertToSelf
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
GetUserNameW
OpenProcessToken
RegCloseKey
CreateProcessAsUserW
msvcrt
_getch
Sections
.text Size: 52KB - Virtual size: 49KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 32KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ