Static task
static1
Behavioral task
behavioral1
Sample
bd6f72662cf3f7ece99f68c14082231d63597fdb886f27c19ca1c93928781a3b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bd6f72662cf3f7ece99f68c14082231d63597fdb886f27c19ca1c93928781a3b.exe
Resource
win10v2004-20220901-en
General
-
Target
bd6f72662cf3f7ece99f68c14082231d63597fdb886f27c19ca1c93928781a3b
-
Size
88KB
-
MD5
60d2aedb171585d750410f44e02a86f0
-
SHA1
f17f4aedac0e7c1f096ff090dc8d3ba8b2f14517
-
SHA256
bd6f72662cf3f7ece99f68c14082231d63597fdb886f27c19ca1c93928781a3b
-
SHA512
851333addfef1491ce604a264c77c5ece52da3b2b52ab7df831141ec6e3a1cf48c391aa2674a3bc0247bcc4205da2d118eb1f196440ec411176ef8ad70468929
-
SSDEEP
1536:GmBJ7Smu0XPXotDSWkGhM0tTBdGoBk5TXa62Al1UJZ9T3eFNJIhsjzxGM:JBJOmuzlvAo2c62A/8T38IrM
Malware Config
Signatures
Files
-
bd6f72662cf3f7ece99f68c14082231d63597fdb886f27c19ca1c93928781a3b.exe windows x86
50c384a652c3ed82472dc187c827d385
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegEnumKeyA
RegDeleteValueA
kernel32
GetFileType
ExitProcess
WriteFile
lstrcpyA
GetLastError
VirtualQuery
GetStringTypeA
GetVersionExA
VirtualFree
SetThreadLocale
LoadLibraryA
GetFileSize
LoadResource
ExitThread
WaitForSingleObject
GetACP
GetStdHandle
FindClose
VirtualAllocEx
SetEndOfFile
lstrcmpiA
GetCurrentThreadId
RaiseException
LocalAlloc
GetCurrentThread
GetFullPathNameA
GetVersion
VirtualAlloc
ReadFile
GetModuleHandleA
GetLocaleInfoA
GetSystemDefaultLangID
FindFirstFileA
lstrcmpA
MoveFileExA
CloseHandle
EnterCriticalSection
CreateThread
HeapAlloc
lstrlenA
Sleep
GetProcAddress
GetDiskFreeSpaceA
LockResource
GlobalAddAtomA
GlobalAlloc
LocalFree
GetThreadLocale
SetHandleCount
FormatMessageA
GlobalDeleteAtom
InitializeCriticalSection
GetModuleFileNameA
GetCPInfo
GetCurrentProcess
SetLastError
CompareStringA
GetTickCount
LoadLibraryExA
CreateEventA
GetOEMCP
oleaut32
SysFreeString
SafeArrayCreate
RegisterTypeLib
SafeArrayUnaccessData
VariantCopyInd
shell32
SHFileOperationA
SHGetDesktopFolder
SHGetSpecialFolderLocation
ole32
CoUnmarshalInterface
OleRun
StgCreateDocfileOnILockBytes
CreateStreamOnHGlobal
CreateBindCtx
StringFromIID
CoReleaseMarshalData
CoRegisterClassObject
CLSIDFromString
CLSIDFromProgID
msvcrt
memcpy
atan
memmove
malloc
strncmp
user32
DrawIcon
GetMenuState
GetMenuStringA
GetScrollPos
CallNextHookEx
GetSysColorBrush
SetWindowTextA
GetDC
FillRect
GetActiveWindow
GetDesktopWindow
GetParent
GetWindow
GetScrollRange
GetCursor
DispatchMessageW
DrawEdge
GetSubMenu
EnableMenuItem
GetMessagePos
CreatePopupMenu
GetScrollInfo
GetMenuItemInfoA
IsWindowVisible
EqualRect
CreateIcon
IsChild
IsWindowEnabled
GetWindowTextA
GetPropA
GetSysColor
EnumWindows
GetMenuItemID
DrawMenuBar
comdlg32
ChooseColorA
FindTextA
GetSaveFileNameA
Sections
CODE Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 49KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 930B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ