Static task
static1
Behavioral task
behavioral1
Sample
bb2db234c771dfef1fe9a21de141426e0cf6932223f15470d2ca4f98069861e1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bb2db234c771dfef1fe9a21de141426e0cf6932223f15470d2ca4f98069861e1.exe
Resource
win10v2004-20220812-en
General
-
Target
bb2db234c771dfef1fe9a21de141426e0cf6932223f15470d2ca4f98069861e1
-
Size
162KB
-
MD5
96e418b74fb967e97f026bfb353f39a0
-
SHA1
41faddafd3cc5916fab873730064821ad2ea400e
-
SHA256
bb2db234c771dfef1fe9a21de141426e0cf6932223f15470d2ca4f98069861e1
-
SHA512
9ece48035dc25fe3ac24fc008ba9fb66a5bf8220f7b5c0a1a6059d2bf79b3575d80365ea24e9d2b889e475c7ff60fc9210dd0a6f142fd21bafd901f457b42c2e
-
SSDEEP
3072:zTPBHaVNmGaCUFiA6MpQDujMfg8d81vSsMehbyLciVGMjMxvpytvGoXRi79Eo:zlyQPYA6MmDnovSs4LjMKDRIEo
Malware Config
Signatures
Files
-
bb2db234c771dfef1fe9a21de141426e0cf6932223f15470d2ca4f98069861e1.exe windows x86
e47b73b720704dc75c43c7d3bf4cd6aa
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindNextFileW
CreateDirectoryExA
Module32First
GetSystemInfo
GetThreadLocale
UpdateResourceW
VirtualUnlock
GetLongPathNameA
LoadLibraryW
dciman32
DCICreateOverlay
DCIOpenProvider
DCICreatePrimary
DCICloseProvider
WinWatchOpen
WinWatchNotify
DCICreateOffscreen
WinWatchDidStatusChange
DCIDestroy
GetDCRegionData
WinWatchGetClipList
DCISetSrcDestClip
DCIDraw
DCISetDestination
ntdll
NtWaitForMultipleObjects
NtSetBootOptions
ZwMapUserPhysicalPages
NtAccessCheckByTypeResultListAndAuditAlarm
NtLockRegistryKey
__toascii
RtlAcquirePebLock
NtWaitLowEventPair
NtCreateWaitablePort
ZwOpenFile
sqlsrv32
SQLColAttributeW
SQLSetDescFieldW
SQLSetConnectOptionW
SQLDescribeColW
SQLExecDirectW
SQLCopyDesc
BCP_colfmt
SQLNumParams
SQLDisconnect
SQLSetStmtAttrW
SQLSetPos
SQLRowCount
SQLSetEnvAttr
SQLNumResultCols
SQLCancel
crypt32
I_CryptGetAsn1Encoder
CryptSIPRemoveProvider
CertUnregisterSystemStore
CertVerifyTimeValidity
CryptStringToBinaryA
CertSaveStore
CertEnumSystemStore
I_CryptInsertLruEntry
CertRDNValueToStrW
utildll
QueryCurrentWinStation
GetUserFromSid
GetUnknownString
RegGetNetworkDeviceName
StrConnectState
SetupAsyncCdConfig
WinEnumerateDevices
TestUserForAdmin
CompareElapsedTime
CachedGetUserFromSid
InitializeAnonymousUserCompareList
StrSystemWaitReason
GetSystemMessageW
ConfigureModem
ParseDecoratedAsyncDeviceName
ElapsedTimeString
StrProcessState
AsyncDeviceEnumerate
InstallModem
DateTimeString
NetworkDeviceEnumerate
StandardErrorMessage
StrSdClass
IsPartOfDomain
FormDecoratedAsyncDeviceName
msv1_0
MsvGetLogonAttemptCount
MsvSamValidate
Msv1_0SubAuthenticationPresent
LsaApCallPackage
SpUserModeInitialize
LsaApCallPackagePassthrough
SpInitialize
LsaApLogonTerminated
LsaApLogonUserEx2
MsvSamLogoff
LsaApInitializePackage
SpLsaModeInitialize
SpInstanceInit
Msv1_0ExportSubAuthenticationRoutine
LsaApCallPackageUntrusted
ifsutil
?QueryNtfsVersion@IFS_SYSTEM@@SGEPAE0PAVLOG_IO_DP_DRIVE@@PAX@Z
?GetNextDataSlot@TLINK@@QAEAAVBIG_INT@@XZ
?Initialize@INTSTACK@@QAEEXZ
?GetDrive@SUPERAREA@@QAEPAVIO_DP_DRIVE@@XZ
??0LOG_IO_DP_DRIVE@@QAE@XZ
?QuerySize@TLINK@@QBEGXZ
?SetVolumeLabelAndPrintFormatReport@VOL_LIODPDRV@@QAEEPBVWSTRING@@PAVMESSAGE@@@Z
?IsThisNtfs@IFS_SYSTEM@@SGEVBIG_INT@@KPAX@Z
?Initialize@READ_CACHE@@QAEEPAVIO_DP_DRIVE@@K@Z
??0SPARSE_SET@@QAE@XZ
?GetCannedSecurityDescriptor@CANNED_SECURITY@@QAEPAXW4_CANNED_SECURITY_TYPE@@PAK@Z
?Initialize@DIGRAPH@@QAEEK@Z
??1CANNED_SECURITY@@UAE@XZ
?IsArcSystemPartition@IFS_SYSTEM@@SGEPBVWSTRING@@PAE@Z
?ShellSort@TLINK@@QAEXXZ
Sections
.text Size: 60KB - Virtual size: 59KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 58KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ