Static task
static1
Behavioral task
behavioral1
Sample
bd4510321ff97e87f4807553286afea441bae5dafac5f9cf535a29568fef5c56.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bd4510321ff97e87f4807553286afea441bae5dafac5f9cf535a29568fef5c56.exe
Resource
win10v2004-20220812-en
General
-
Target
bd4510321ff97e87f4807553286afea441bae5dafac5f9cf535a29568fef5c56
-
Size
290KB
-
MD5
5f5f724af3e7fbdfbe87b3c5cf453c32
-
SHA1
4f4b1e583e81bfb131e94a350bd27b1987300c2e
-
SHA256
bd4510321ff97e87f4807553286afea441bae5dafac5f9cf535a29568fef5c56
-
SHA512
374f464f68456fd21d1be7365f62b4a4731bebe56095dc90846b15874db1143beeee2ff26f8db5780c1e9785fec69878d425353f01c2d3962f085f2f75311007
-
SSDEEP
6144:xbrptm16+nJqid8yLTwxV4QyG6JVpdutSiSxnxD:xbrptmwq1dN+N6rpdOSiSxZ
Malware Config
Signatures
Files
-
bd4510321ff97e87f4807553286afea441bae5dafac5f9cf535a29568fef5c56.exe windows x86
03d30f4d0edc6668cc2374075962a9e2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetACP
DeleteCriticalSection
UnhandledExceptionFilter
ReleaseSemaphore
CreateThread
IsDebuggerPresent
LeaveCriticalSection
VirtualProtectEx
ReadProcessMemory
ResumeThread
SetThreadPriority
OpenProcess
GetShortPathNameW
FreeLibrary
FindFirstFileW
EnterCriticalSection
GetSystemTime
WaitForSingleObject
GetDriveTypeW
GetSystemTimeAsFileTime
CreateFileW
FindClose
CreateDirectoryW
GetFileSize
CreateSemaphoreA
GetCurrentThreadId
SystemTimeToFileTime
SetUnhandledExceptionFilter
CloseHandle
FindNextFileW
GetExitCodeThread
VirtualAlloc
psapi
GetProcessMemoryInfo
ole32
CoCreateInstance
CoUninitialize
StgOpenStorageEx
CoInitializeEx
CoTaskMemFree
StgCreateStorageEx
CoInitialize
advapi32
RegCloseKey
RegOpenKeyExW
OpenProcessToken
userenv
GetUserProfileDirectoryW
esent
JetCreateIndex
JetDelete
JetUnregisterCallback
JetTerm2
JetCreateTableColumnIndex2
JetRestore
JetRegisterCallback
JetGetCurrentIndex
JetCreateInstance
JetEndExternalBackupInstance
JetCreateTable
JetPrepareToCommitTransaction
JetAttachDatabaseWithStreaming
msctfp
GetProxyDllInfo
DllGetClassObject
DllUnregisterServer
DllRegisterServer
Sections
.text Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 260KB - Virtual size: 337KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ