Static task
static1
Behavioral task
behavioral1
Sample
bf02b2428c089766631ee506d4fea05b4402bc90bc8978cdc3209e43ada75ccc.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
bf02b2428c089766631ee506d4fea05b4402bc90bc8978cdc3209e43ada75ccc.exe
Resource
win10v2004-20220901-en
General
-
Target
bf02b2428c089766631ee506d4fea05b4402bc90bc8978cdc3209e43ada75ccc
-
Size
280KB
-
MD5
a2b3100b5a49868bd0722d0e89ab40b9
-
SHA1
3c9ab4794a040d83a38ce8c80c9bb6fb34516a25
-
SHA256
bf02b2428c089766631ee506d4fea05b4402bc90bc8978cdc3209e43ada75ccc
-
SHA512
61577f8570653fa5f65c69e90e476ddb4a0f679df4480dc85bfc2bdefa10223448049b3e5071d30c71914d4ceea6c0743d436c903a13531bc9ce464fda500732
-
SSDEEP
6144:TU6SVrjpV8Gz8y/mdv9pJwghwD8JXDQz1WUIQL:TU6mrVVdQWmFiW4W/
Malware Config
Signatures
Files
-
bf02b2428c089766631ee506d4fea05b4402bc90bc8978cdc3209e43ada75ccc.exe windows x86
8a3372470db8cb92402c234685cd5f7e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
UnhandledExceptionFilter
QueryDosDeviceW
UnmapViewOfFile
FindFirstFileExW
GetStringTypeExW
OutputDebugStringA
SetMailslotInfo
CreateIoCompletionPort
SetErrorMode
ReadConsoleA
GetTapeParameters
EndUpdateResourceA
OpenSemaphoreW
SetCommMask
IsBadStringPtrA
GetTimeZoneInformation
lstrcpyA
LocalAlloc
GetConsoleCursorInfo
SetStdHandle
SetFileTime
GlobalAddAtomA
EnumResourceNamesW
GlobalFree
GetCompressedFileSizeW
lstrcpynA
GlobalFindAtomW
_lopen
FindResourceExA
SetThreadLocale
OpenMutexA
ReadFile
GetDiskFreeSpaceExA
CreateFileW
GetTapeStatus
FileTimeToLocalFileTime
SetHandleCount
VirtualProtect
GetVersionExA
_lread
GetAtomNameA
ReadConsoleInputW
GetFileAttributesA
SetNamedPipeHandleState
GetSystemTimeAsFileTime
GetUserDefaultLangID
GetCurrentProcess
GetOverlappedResult
GetLongPathNameA
SetConsoleWindowInfo
GetFileAttributesExA
GetProcessTimes
SystemTimeToFileTime
DuplicateHandle
FillConsoleOutputCharacterA
PulseEvent
SetEndOfFile
GetStartupInfoA
LocalReAlloc
GetSystemDefaultLangID
GetCommandLineA
lstrlenA
GetFileInformationByHandle
WritePrivateProfileSectionA
QueryDosDeviceA
WritePrivateProfileStructA
MultiByteToWideChar
CreateDirectoryA
LoadLibraryExA
LocalLock
ClearCommBreak
FlushConsoleInputBuffer
CopyFileExW
FindFirstFileA
CreateMutexA
CreateWaitableTimerA
FormatMessageW
GetSystemInfo
Beep
GlobalUnlock
GetACP
VirtualLock
SetConsoleOutputCP
VirtualAlloc
SetCommTimeouts
ExitProcess
user32
EndPaint
CopyImage
PostMessageA
LoadMenuA
OpenInputDesktop
ExitWindowsEx
ReleaseDC
OemKeyScan
GetDesktopWindow
SendMessageA
GetClientRect
SetWindowRgn
GetUserObjectInformationW
DefFrameProcA
GetDlgItem
SetFocus
RegisterClassA
GetWindowWord
ToAscii
LoadBitmapA
IsClipboardFormatAvailable
CreateCursor
gdi32
GetCharWidthW
GetPixel
GetWinMetaFileBits
Arc
SetPixelFormat
SaveDC
EndPage
CopyMetaFileW
CreateBitmap
GetTextCharsetInfo
CopyEnhMetaFileW
GetTextExtentExPointW
CreateMetaFileA
GdiComment
GetSystemPaletteEntries
CreateDCA
GetTextColor
PolyPolyline
PolyBezier
RemoveFontResourceW
advapi32
BuildSecurityDescriptorW
EnumDependentServicesW
OpenSCManagerA
MakeAbsoluteSD
GetPrivateObjectSecurity
ImpersonateLoggedOnUser
ReadEventLogW
RegUnLoadKeyA
RegEnumKeyExA
RegisterEventSourceA
CryptDestroyKey
GetLengthSid
StartServiceW
PrivilegeCheck
CryptGetUserKey
EnumDependentServicesA
LookupAccountSidA
SetSecurityDescriptorOwner
GetSecurityDescriptorOwner
RegReplaceKeyW
CreatePrivateObjectSecurity
CreateServiceA
CryptExportKey
shell32
SHGetPathFromIDListA
SHGetDesktopFolder
ExtractIconA
ole32
MkParseDisplayName
ReadClassStm
StringFromGUID2
CoQueryProxyBlanket
CoGetClassObject
oleaut32
LoadTypeLibEx
SafeArrayPutElement
SysAllocStringLen
SafeArrayGetElement
SysFreeString
SafeArrayRedim
SafeArrayUnaccessData
comctl32
ImageList_BeginDrag
shlwapi
SHCopyKeyW
PathAppendW
SHQueryValueExW
Sections
.text Size: 236KB - Virtual size: 233KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE