Static task
static1
Behavioral task
behavioral1
Sample
bca765b4a0344465860547a0b972ea8a477ce47a727cd6531c22a63c25b125e1.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
bca765b4a0344465860547a0b972ea8a477ce47a727cd6531c22a63c25b125e1.exe
Resource
win10v2004-20221111-en
General
-
Target
bca765b4a0344465860547a0b972ea8a477ce47a727cd6531c22a63c25b125e1
-
Size
818KB
-
MD5
b0f45151a0d8a30a124b659605e2ee01
-
SHA1
4afcf5f8b66c8e96a66a8043284942fdfdf76a6a
-
SHA256
bca765b4a0344465860547a0b972ea8a477ce47a727cd6531c22a63c25b125e1
-
SHA512
c0119cf27552ba4e61566b484fa7f8badc82c315659597de350362362bdcfc94ca6ae200be187bd2723edd7785d0ff4f73c3ea4ab150a2d665b9afe16f1c2fb2
-
SSDEEP
12288:tKmlCZCF6sQiCM2qN8pmPNu2zB978Uldjiyo50Qwjm8nW6NOfiNNmlgMOtaDmBec:nlCZCLQf4VPKB36Np7mlp2ytvEoIT
Malware Config
Signatures
Files
-
bca765b4a0344465860547a0b972ea8a477ce47a727cd6531c22a63c25b125e1.exe windows x86
4af54e6095703cc301722f77ccf6ec47
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
ContinueDebugEvent
CreateFileA
CreateProcessA
CreateThread
DebugActiveProcess
DeleteCriticalSection
EnterCriticalSection
ExitProcess
FlushInstructionCache
GetACP
GetCPInfo
GetCommandLineA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetEnvironmentStrings
GetFileType
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeW
GetThreadContext
GetVersion
GetVersionExA
GlobalMemoryStatus
HeapAlloc
HeapFree
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
MultiByteToWideChar
OpenProcess
RaiseException
ReadProcessMemory
ResumeThread
RtlUnwind
SetConsoleCtrlHandler
SetFilePointer
SetHandleCount
SetLastError
SetPriorityClass
SetThreadContext
SetThreadPriority
Sleep
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualProtectEx
VirtualQuery
WaitForDebugEvent
WideCharToMultiByte
WriteFile
WriteProcessMemory
user32
EnumThreadWindows
MessageBoxA
wsprintfA
winmm
timeGetTime
Sections
.text Size: 596KB - Virtual size: 676KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ecode Size: - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 44KB - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 47KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 43KB - Virtual size: 108KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 53KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 21KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE