Static task
static1
Behavioral task
behavioral1
Sample
bcf48fd97771f7898086f4ba2ae11352cee694bfd2466ca79695ec7a9dd4c978.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
bcf48fd97771f7898086f4ba2ae11352cee694bfd2466ca79695ec7a9dd4c978.exe
Resource
win10v2004-20220812-en
General
-
Target
bcf48fd97771f7898086f4ba2ae11352cee694bfd2466ca79695ec7a9dd4c978
-
Size
81KB
-
MD5
31c0cf495f44e9159b17d566ae1e37f0
-
SHA1
351a0fa1dd807dc649f537b86b406ca15fc76ac1
-
SHA256
bcf48fd97771f7898086f4ba2ae11352cee694bfd2466ca79695ec7a9dd4c978
-
SHA512
1eab679dede50a4684c50ae965fe1540faf0c71aec0d79d71697f14f535a2e1725f920707dadcb5d8955910cae1db6de4dc56cb1f456ff0cca30bd115ca8bed5
-
SSDEEP
1536:0QiLN2VPvbWl5vFDckjYQ6Rt4MhZ7/BNiIBpboSZ55dIv9hWPDs+JjEgom:0QkUVnbWl5vFwNnROMhZ75N3pbFZ55m2
Malware Config
Signatures
Files
-
bcf48fd97771f7898086f4ba2ae11352cee694bfd2466ca79695ec7a9dd4c978.exe windows x86
e276dd79d5c16e0fcc2053ccf6ab1f2c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
user32
GetSubMenu
SetWindowTextA
FrameRect
EnableMenuItem
SetWindowPos
GetMessageA
GetSysColorBrush
EnumWindows
PostQuitMessage
GetScrollPos
GetSysColor
EqualRect
UnhookWindowsHookEx
kernel32
GetThreadLocale
GetTempPathA
GetStartupInfoA
GetACP
InterlockedExchange
GetSystemTime
GetCurrentProcessId
GetFileAttributesA
FileTimeToSystemTime
GetOEMCP
VirtualAllocEx
QueryPerformanceCounter
GetTickCount
RtlUnwind
SetUnhandledExceptionFilter
GetTimeZoneInformation
ExitProcess
gdi32
GetMapMode
CreateCompatibleBitmap
CopyEnhMetaFileA
SelectClipPath
SetViewportExtEx
DPtoLP
CreateICW
FillRgn
ExcludeClipRect
ole32
OleRun
CoTaskMemRealloc
DoDragDrop
CoRevokeClassObject
CoCreateInstance
CoInitializeSecurity
CoInitialize
StgOpenStorage
StringFromGUID2
advapi32
AdjustTokenPrivileges
GetSecurityDescriptorDacl
CheckTokenMembership
CryptHashData
FreeSid
QueryServiceStatus
RegCreateKeyA
GetUserNameA
RegCreateKeyExW
RegQueryValueExW
msvcrt
strcspn
puts
_flsbuf
_mbscmp
signal
__initenv
strlen
raise
_lock
_strdup
fflush
strncpy
__getmainargs
__setusermatherr
fprintf
_fdopen
iswspace
_CIpow
comctl32
ImageList_DragEnter
ImageList_ReplaceIcon
ImageList_GetIconSize
ImageList_GetBkColor
ImageList_GetIcon
ImageList_SetIconSize
ImageList_LoadImageW
ImageList_Write
InitCommonControls
CreatePropertySheetPageA
ImageList_DrawEx
ImageList_Destroy
ImageList_LoadImageA
shell32
SHBrowseForFolderA
ExtractIconW
DoEnvironmentSubstW
DragQueryFileA
CommandLineToArgvW
ExtractIconExW
DragAcceptFiles
ShellExecuteW
SHGetPathFromIDList
DragQueryFileW
ShellExecuteEx
oleaut32
SafeArrayUnaccessData
SysReAllocStringLen
VariantCopy
SafeArrayPutElement
SafeArrayPtrOfIndex
SafeArrayCreate
SafeArrayGetUBound
SafeArrayRedim
Sections
.text Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ