Static task
static1
Behavioral task
behavioral1
Sample
bd5dd04dc84068ae274490fbb0f63c35977f29e8406d0d6900fee7d460985b4a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
bd5dd04dc84068ae274490fbb0f63c35977f29e8406d0d6900fee7d460985b4a.exe
Resource
win10v2004-20221111-en
General
-
Target
bd5dd04dc84068ae274490fbb0f63c35977f29e8406d0d6900fee7d460985b4a
-
Size
404KB
-
MD5
c69677dbde6d7ffac5e5aaf309cb22fb
-
SHA1
5bb1c368b9fe2f15fa9394917c67b9ef9848115b
-
SHA256
bd5dd04dc84068ae274490fbb0f63c35977f29e8406d0d6900fee7d460985b4a
-
SHA512
2bcbcfb387304b7a2ff5c9939d0d7145e7b334edad791010ea7ca37043a566455fee6688bd35d5c05821105f7a94f61b6e6a9c461235c790f201ba3fc7dec6f8
-
SSDEEP
12288:KZZx2dpor1hN53gKizWmEN9YmOycHN/OtD2d:KrxUorwtQNukONA2
Malware Config
Signatures
Files
-
bd5dd04dc84068ae274490fbb0f63c35977f29e8406d0d6900fee7d460985b4a.exe windows x86
949bfc6f4f6f6b219598b93b318c19b3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
oleacc
LresultFromObject
CreateStdAccessibleObject
kernel32
GetLocaleInfoA
CreateProcessA
_lwrite
GetVersionExA
IsBadStringPtrA
GetThreadPriority
OpenProcess
ReadFile
GetExitCodeProcess
TerminateProcess
CloseHandle
GetProcAddress
GetModuleFileNameA
LoadLibraryA
CreateFileA
SetFilePointer
FreeLibrary
WriteFile
WaitForSingleObject
user32
wsprintfW
GetKeyState
ClientToScreen
SetRect
EmptyClipboard
GetWindowRect
EnumWindowStationsW
ScreenToClient
wmvcore
WMCreateProfileManager
Sections
.text Size: 293KB - Virtual size: 293KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 944B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 104KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bomex Size: 4KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ