Static task
static1
Behavioral task
behavioral1
Sample
bfeb9c1020371872e696aa10558531e738341d886a81380626fc1803d5ea30a3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
bfeb9c1020371872e696aa10558531e738341d886a81380626fc1803d5ea30a3.exe
Resource
win10v2004-20221111-en
General
-
Target
bfeb9c1020371872e696aa10558531e738341d886a81380626fc1803d5ea30a3
-
Size
209KB
-
MD5
98ae54acddabebc792fca7b7808bb14b
-
SHA1
579ac9f2a8b9050230046116e571e2c5ce659c05
-
SHA256
bfeb9c1020371872e696aa10558531e738341d886a81380626fc1803d5ea30a3
-
SHA512
883fa12316932d1660792514a1c885d2ef0247b0c01af751890e745eaf7e2c2323eab50ac4fd71477543f82bcd59cf5ede51f465b1935ad10ec112919fc04ca3
-
SSDEEP
6144:PvIbzGvx5H+Iex2O4T2ne+iSUSFgHYB9le5:PvIbzGvxog2e+iSUSaYTle5
Malware Config
Signatures
Files
-
bfeb9c1020371872e696aa10558531e738341d886a81380626fc1803d5ea30a3.exe windows x86
4a5cd4c8db28cddce2b70a1078f035fd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
deviceservicecbt
?NPSCBT_Open@@YAJPAEW4BTSERVICETYPE@@PA_W@Z
?NPSCBT_Init@@YAJXZ
?NPSCBT_GetStackType@@YA?AW4BTSTACKTYPE@@XZ
?NPSCBT_Search_Stop@@YAJXZ
?NPSCBT_Deinit@@YAJXZ
ws2_32
recv
WSAEnumNetworkEvents
WSAWaitForMultipleEvents
shutdown
WSAGetLastError
closesocket
WSAEventSelect
WSACreateEvent
WSAIoctl
WSACleanup
inet_addr
htons
socket
WSAStartup
WSACloseEvent
connect
getsockopt
send
setsockopt
kernel32
SetEvent
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
ReleaseMutex
GetCurrentProcessId
GetCurrentThreadId
InterlockedIncrement
InterlockedDecrement
WaitForMultipleObjects
OpenProcess
CreateThread
WaitForSingleObject
lstrlenW
GetModuleFileNameW
Sleep
GetLastError
CreateMutexW
MultiByteToWideChar
LocalFree
LocalAlloc
FormatMessageW
TerminateProcess
ResumeThread
AssignProcessToJobObject
CreateProcessW
SetInformationJobObject
CreateJobObjectW
DeviceIoControl
CreateFileW
GetDriveTypeW
WideCharToMultiByte
GetTickCount
GetVersionExW
OutputDebugStringW
GetCurrentProcess
GetProcAddress
GetModuleHandleW
FreeLibrary
WriteFile
QueryPerformanceCounter
QueryPerformanceFrequency
GetCommandLineW
PurgeComm
EscapeCommFunction
SetCommMask
ClearCommError
GetOverlappedResult
ReadFile
WaitCommEvent
SetCommTimeouts
SetCommState
GetCommState
SetupComm
GetCommModemStatus
RaiseException
OutputDebugStringA
OpenEventA
CreateEventA
ExitThread
LoadLibraryA
GetSystemTimeAsFileTime
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStartupInfoW
InterlockedCompareExchange
InterlockedExchange
CloseHandle
DeleteCriticalSection
EnterCriticalSection
ResetEvent
LeaveCriticalSection
CreateEventW
InitializeCriticalSection
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
user32
RegisterWindowMessageW
PostMessageW
DispatchMessageW
GetMessageW
PostThreadMessageW
CharNextW
CharUpperW
TranslateMessage
advapi32
RegOpenKeyExA
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
RegCreateKeyW
RegOpenKeyW
RegQueryValueExA
RegEnumKeyExW
RegQueryInfoKeyW
RegCreateKeyExW
RegCloseKey
shell32
SHGetSpecialFolderPathW
ord165
ole32
CoTaskMemFree
StringFromCLSID
CoInitializeEx
CoUninitialize
CoSuspendClassObjects
CoResumeClassObjects
CoInitialize
CoCreateInstance
oleaut32
GetErrorInfo
RegisterTypeLi
UnRegisterTypeLi
VARIANT_UserSize
VARIANT_UserMarshal
VARIANT_UserUnmarshal
VARIANT_UserFree
BSTR_UserSize
BSTR_UserMarshal
BSTR_UserUnmarshal
BSTR_UserFree
LPSAFEARRAY_UserSize
LPSAFEARRAY_UserMarshal
LPSAFEARRAY_UserUnmarshal
LPSAFEARRAY_UserFree
SafeArrayCreate
SafeArrayGetUBound
SafeArrayGetLBound
SysAllocString
SafeArrayLock
SafeArrayCreateVector
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayDestroy
SafeArrayCopy
VariantClear
VariantInit
SafeArrayGetVartype
LoadTypeLi
LoadRegTypeLi
SysStringLen
SysAllocStringLen
SysFreeString
SafeArrayUnlock
atl90
ord64
ord20
ord17
ord10
ord68
ord31
ord58
ord32
ord61
ord23
ord11
ord56
ord49
ord67
setupapi
SetupDiGetDeviceInstanceIdW
SetupDiEnumDeviceInfo
SetupDiDestroyDeviceInfoList
SetupDiGetClassDevsW
msvcp90
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
msvcr90
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
_vsnprintf_s
strnlen
malloc
wcsncpy_s
wcscat_s
vsprintf_s
_vscprintf
_vsnwprintf_s
swscanf_s
wcscspn
wcsspn
memset
wcsnlen
__setusermatherr
_wtoi
swprintf_s
_wcsupr_s
wcschr
wcsstr
_wcsicmp
free
vswprintf_s
_vscwprintf
memmove_s
?_type_info_dtor_internal_method@type_info@@QAEXXZ
memcpy
??_V@YAXPAX@Z
??2@YAPAXI@Z
??0exception@std@@QAE@ABV01@@Z
_CxxThrowException
_invalid_parameter_noinfo
__CxxFrameHandler3
??0exception@std@@QAE@XZ
??1exception@std@@UAE@XZ
?what@exception@std@@UBEPBDXZ
??0exception@std@@QAE@ABQBD@Z
??3@YAXPAX@Z
_configthreadlocale
_initterm_e
_initterm
_wcmdln
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
_amsg_exit
_decode_pointer
_onexit
_lock
_encode_pointer
__dllonexit
_unlock
?terminate@@YAXXZ
_except_handler4_common
sprintf_s
_crt_debugger_hook
_invoke_watson
memcpy_s
_controlfp_s
rpcrt4
NdrCStdStubBuffer2_Release
NdrOleAllocate
NdrOleFree
IUnknown_QueryInterface_Proxy
IUnknown_AddRef_Proxy
IUnknown_Release_Proxy
NdrStubForwardingFunction
NdrStubCall2
Sections
.text Size: 84KB - Virtual size: 83KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.orpc Size: 512B - Virtual size: 266B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rorpc Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE