Static task
static1
Behavioral task
behavioral1
Sample
bd64e44541ea73a40dcab26fd2e77a7b221a8dab35e75e227e899c4f322880e7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bd64e44541ea73a40dcab26fd2e77a7b221a8dab35e75e227e899c4f322880e7.exe
Resource
win10v2004-20220812-en
General
-
Target
bd64e44541ea73a40dcab26fd2e77a7b221a8dab35e75e227e899c4f322880e7
-
Size
138KB
-
MD5
bb2c98deeaf292c794fcf5d614bcd53b
-
SHA1
597ca04774ec3b3a5c507a279aa2f8721f232b65
-
SHA256
bd64e44541ea73a40dcab26fd2e77a7b221a8dab35e75e227e899c4f322880e7
-
SHA512
cfb94b79cd20990a0ff83b25c40acb07da5c3c02d2ca8d7ff7d09a44e0fd54f9bf05c6635cde3d493960a31376def11c8acddbd870af818ff7f07fbfedf6f6b8
-
SSDEEP
3072:cvNNi9w22O1h1bOgJb08lFphsnply6MNH9nb0:eNNiPj5CEb0AFQnu3H9b0
Malware Config
Signatures
Files
-
bd64e44541ea73a40dcab26fd2e77a7b221a8dab35e75e227e899c4f322880e7.exe windows x86
b7f20378bec44c557bb109669d929986
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DispatchMessageW
DdeInitializeW
GetClassNameW
DisplayExitWindowsWarnings
GetWindowTextLengthA
MapVirtualKeyA
DrawMenuBarTemp
UnhookWindowsHook
BeginPaint
DrawIconEx
GetMessageExtraInfo
DdeAbandonTransaction
GetClassInfoExW
ToUnicodeEx
SetProcessWindowStation
EnableScrollBar
ValidateRgn
BroadcastSystemMessageExW
IsDlgButtonChecked
PrintWindow
GetTopWindow
TileWindows
AttachThreadInput
GetDesktopWindow
BlockInput
EndDeferWindowPos
DdeQueryStringA
SetWindowRgn
EndTask
SendDlgItemMessageA
CreateWindowExA
MenuWindowProcA
GetMenuBarInfo
GetUserObjectInformationA
TabbedTextOutW
MessageBoxW
TranslateMessage
EnumWindowStationsW
MoveWindow
SetDlgItemInt
UpdatePerUserSystemParameters
TranslateAcceleratorA
IMPGetIMEA
GetParent
GetClassWord
GetMessageA
SetMenu
IsChild
OemToCharBuffA
PrivateExtractIconExA
EnumPropsW
CheckRadioButton
RegisterMessagePumpHook
GetWindowTextW
MenuItemFromPoint
DdeConnectList
InflateRect
EnterReaderModeHelper
IsWinEventHookInstalled
MessageBoxTimeoutA
IMPQueryIMEW
GetWinStationInfo
WCSToMBEx
GetInputDesktop
ModifyMenuW
IsDialogMessageA
GetRawInputData
GetAsyncKeyState
BroadcastSystemMessageExA
AnimateWindow
SetWindowTextW
SetWindowLongW
MB_GetString
EndDialog
CreateWindowStationW
SetCaretPos
CharLowerBuffW
IsWindowInDestroy
CloseWindowStation
IsCharAlphaNumericA
RegisterClipboardFormatA
keybd_event
CopyIcon
GetNextDlgTabItem
User32InitializeImmEntryTable
GetMenuDefaultItem
CreateCaret
SetScrollInfo
PaintDesktop
LoadStringW
CopyRect
UnhookWindowsHookEx
IsDialogMessageW
HideCaret
GetRawInputDeviceInfoW
DdeSetUserHandle
RegisterClassExA
DlgDirListA
CallMsgFilter
ChangeDisplaySettingsW
SetMessageExtraInfo
ToUnicode
RealGetWindowClass
CreateDialogIndirectParamW
GetCapture
EnumDisplayDevicesW
IsDialogMessage
RedrawWindow
UnregisterUserApiHook
EnumDisplayMonitors
DrawMenuBar
GetGuiResources
ChangeClipboardChain
SendMessageTimeoutA
MonitorFromPoint
OpenDesktopW
EnumWindowStationsA
GetWindowModuleFileName
CallMsgFilterA
GetClipboardData
EnumClipboardFormats
OpenClipboard
IsHungAppWindow
TileChildWindows
GetUpdateRect
RegisterDeviceNotificationA
OemToCharA
GetMouseMovePointsEx
UnregisterClassW
SetClassLongA
ChildWindowFromPoint
DisableProcessWindowsGhosting
GetWindowModuleFileNameW
EndMenu
GetDlgItemTextW
LoadStringW
DrawCaption
DefRawInputProc
GetSubMenu
GetMessageW
GetUserObjectInformationW
UpdateLayeredWindow
LoadIconW
DestroyAcceleratorTable
TabbedTextOutA
CreateDialogIndirectParamAorW
ReasonCodeNeedsBugID
DefDlgProcA
DestroyCursor
GetMenuItemInfoW
InternalGetWindowText
GetOpenClipboardWindow
GetCursor
LockWindowUpdate
SetUserObjectSecurity
GetDialogBaseUnits
TranslateAccelerator
GetKeyState
DdeGetData
SetScrollPos
GetWindowContextHelpId
CliImmSetHotKey
LoadBitmapA
ValidateRect
IMPGetIMEW
VkKeyScanW
GetMenuContextHelpId
ActivateKeyboardLayout
MonitorFromWindow
SetWinEventHook
FindWindowExW
SetWindowsHookW
UnregisterMessagePumpHook
ChangeMenuW
PaintMenuBar
WindowFromDC
GetWindowDC
DeleteMenu
ChangeDisplaySettingsA
SetDlgItemTextA
GetWindowLongW
UnlockWindowStation
kernel32
EraseTape
CreateJobObjectA
DeleteVolumeMountPointW
UnhandledExceptionFilter
WriteConsoleW
GetFileTime
GlobalCompact
GetTickCount
DebugActiveProcess
SystemTimeToTzSpecificLocalTime
MapUserPhysicalPagesScatter
QueryPerformanceCounter
FillConsoleOutputAttribute
GetTimeFormatW
SetProcessAffinityMask
FreeLibrary
RtlMoveMemory
VDMConsoleOperation
SetCommBreak
Process32First
InterlockedFlushSList
CreateWaitableTimerA
GetSystemDefaultLangID
CreateHardLinkA
GetStdHandle
SetThreadUILanguage
LZCloseFile
SetProcessWorkingSetSize
LocalSize
HeapLock
InterlockedExchangeAdd
_lwrite
PeekNamedPipe
LCMapStringA
GetCurrentProcess
GetLongPathNameW
GetStartupInfoW
SetConsoleMode
GetVolumeInformationA
CreateJobSet
LocalFree
RegisterWaitForInputIdle
GetCurrentProcessId
FoldStringW
SetConsoleKeyShortcuts
FindActCtxSectionStringW
RegisterConsoleOS2
TerminateProcess
GetACP
FreeConsole
CallNamedPipeA
VirtualAlloc
SetThreadLocale
GetFileType
SetUnhandledExceptionFilter
RequestWakeupLatency
lstrlenW
WriteConsoleOutputW
GetConsoleMode
lstrcmpi
FindActCtxSectionStringA
FormatMessageW
SetLocalPrimaryComputerNameW
LZStart
SetFirmwareEnvironmentVariableW
GetVersionExW
ConvertDefaultLocale
GetConsoleMode
Sleep
GetFileAttributesExW
SetThreadUILanguage
EnumResourceNamesW
RegisterWowBaseHandlers
GetProfileStringA
GetComputerNameW
EnumSystemGeoID
IsDBCSLeadByte
LocalAlloc
IsBadCodePtr
MultiByteToWideChar
GetProfileIntW
UpdateResourceA
GetFileType
WideCharToMultiByte
ExitProcess
SetConsoleCursor
FindFirstVolumeA
GetLastError
GetConsoleOutputCP
GetSystemTimeAsFileTime
advapi32
StartServiceW
LsaClose
RegConnectRegistryW
RegSetValueExW
OpenServiceW
LsaOpenPolicy
RegQueryInfoKeyW
RegQueryValueExW
RegEnumValueW
RegOpenKeyExW
OpenSCManagerW
LsaFreeMemory
QueryServiceStatus
RegCloseKey
CloseServiceHandle
ControlService
LsaQueryInformationPolicy
oleaut32
SysFreeString
VarBstrFromDate
SysAllocString
VarDateFromUdate
netapi32
NetUseAdd
NetApiBufferFree
NetUseDel
NetServerGetInfo
NetUseGetInfo
ole32
CoUninitialize
CoCreateInstanceEx
CoInitializeEx
ws2_32
gethostname
gethostbyname
WSACleanup
inet_addr
WSAStartup
gethostbyaddr
shlwapi
StrStrIW
msvcrt
setlocale
sprintf
_exit
exit
__wgetmainargs
wcscmp
wcslen
_wcsrev
_getch
_wtoi
_wcsupr
free
_cexit
wcsncpy
fwrite
_initterm
_wcsicmp
puts
_wcsnicmp
wcsrchr
__set_app_type
_controlfp
fputwc
wcsstr
atof
malloc
wcsncat
_iob
wcscpy
fprintf
fflush
wcscat
wcsncmp
fread
__winitenv
_wcsdup
_itow
_strdup
_c_exit
fwprintf
getc
__setusermatherr
fgetws
wcstok
atoi
wprintf
_snwprintf
_putws
_XcptFilter
secur32
SaslIdentifyPackageA
SealMessage
SaslAcceptSecurityContext
InitSecurityInterfaceW
AcquireCredentialsHandleW
InitializeSecurityContextA
SaslIdentifyPackageW
LsaLogonUser
LsaCallAuthenticationPackage
DeleteSecurityContext
RevertSecurityContext
EnumerateSecurityPackagesW
QueryCredentialsAttributesW
FreeCredentialsHandle
LsaFreeReturnBuffer
AddCredentialsW
LsaDeregisterLogonProcess
GetComputerObjectNameW
Sections
.TwNcId Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.LMI Size: 2KB - Virtual size: 30KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vcMJ Size: 2KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.LuPt Size: 2KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.puCz Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 95KB - Virtual size: 95KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ