BQKM
Static task
static1
Behavioral task
behavioral1
Sample
ca415e58aa3ae0a6fce8164e719110bc01e8c3814063444116f7c1ce833c17c7.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ca415e58aa3ae0a6fce8164e719110bc01e8c3814063444116f7c1ce833c17c7.dll
Resource
win10v2004-20220812-en
General
-
Target
ca415e58aa3ae0a6fce8164e719110bc01e8c3814063444116f7c1ce833c17c7
-
Size
160KB
-
MD5
ea66ad48016b312fc34f683b93d4fcfd
-
SHA1
25f5e4e25b74bb57d60473ae9f088c56018eb613
-
SHA256
ca415e58aa3ae0a6fce8164e719110bc01e8c3814063444116f7c1ce833c17c7
-
SHA512
055c5adb4ae3a194d4ac23db8e48bffa03c57f61e5be2b383a97d6682ab6ab631b9c8ce957b3653fa12fe0e3003e9f0adbaebd5eed132bf5abd9e5fbf7e0a1ec
-
SSDEEP
3072:2QsVEKe3KYw8mxx5POPp3F0GF0WJ0RiAHDxO:2f1zX6Fn0WJ0Ri2DxO
Malware Config
Signatures
Files
-
ca415e58aa3ae0a6fce8164e719110bc01e8c3814063444116f7c1ce833c17c7.dll windows x86
3c2ebac3bc0135de9a5545f76b4c178e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegQueryValueExW
RegEnumValueA
RegDeleteKeyW
RegQueryInfoKeyA
RegOpenKeyW
GetSecurityDescriptorControl
GetTokenInformation
version
GetFileVersionInfoSizeA
kernel32
RtlUnwind
LCMapStringW
IsValidLocale
LoadLibraryA
GetHandleInformation
VirtualAlloc
GetProcAddress
GetModuleHandleA
ReleaseMutex
LockResource
lstrcmpiW
GetCurrentProcessId
QueryPerformanceCounter
CopyFileW
GetLocalTime
GetVersionExA
HeapFree
GetTimeFormatA
IsValidCodePage
GetThreadLocale
InterlockedExchange
GlobalFree
GetFileSize
CreateFileA
LoadLibraryW
lstrcpynW
WriteFile
GetACP
lstrlenA
LoadLibraryExW
IsBadReadPtr
GetStartupInfoW
EnumSystemLocalesA
lstrcpynA
LoadResource
FindResourceW
WriteConsoleA
GetShortPathNameW
IsBadWritePtr
VirtualQuery
UnmapViewOfFile
lstrcmpA
SizeofResource
lstrcpyA
MapViewOfFile
GetStringTypeA
GetStartupInfoA
GetShortPathNameA
GetLocaleInfoA
LCMapStringA
SetCurrentDirectoryW
GetTempPathA
SetEvent
SetLastError
GetModuleFileNameW
SuspendThread
GetStringTypeW
InitializeCriticalSection
ExitProcess
GetSystemTime
HeapAlloc
GetCommandLineA
GetVersion
EnterCriticalSection
LeaveCriticalSection
HeapDestroy
HeapCreate
VirtualFree
DeleteCriticalSection
FatalAppExitA
HeapReAlloc
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
TlsGetValue
GetLastError
GetCurrentThread
SetHandleCount
GetStdHandle
GetFileType
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
CloseHandle
UnhandledExceptionFilter
GetCPInfo
GetOEMCP
FlushFileBuffers
SetStdHandle
SetEndOfFile
ReadFile
SetFilePointer
MultiByteToWideChar
Exports
Exports
Sections
.text Size: 84KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 52KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ