Static task
static1
Behavioral task
behavioral1
Sample
bc86e12058a8a62bb22cfbf535a9924ecc508bc1ffdbb3c95a357b69eb57f9d9.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
bc86e12058a8a62bb22cfbf535a9924ecc508bc1ffdbb3c95a357b69eb57f9d9.exe
Resource
win10v2004-20220901-en
General
-
Target
bc86e12058a8a62bb22cfbf535a9924ecc508bc1ffdbb3c95a357b69eb57f9d9
-
Size
120KB
-
MD5
46eda1c5bf74b42af695c981b718d4d6
-
SHA1
5ce5d3da7532b73827d11495b86b4efeca490c73
-
SHA256
bc86e12058a8a62bb22cfbf535a9924ecc508bc1ffdbb3c95a357b69eb57f9d9
-
SHA512
267c570dfcbae525c83764b6b8a54688f3eb9cd7bc53374109111624279a5c3b5a46dc250a2b06b03546b9ab2745e4749ed1c1149979888e4901037140c463e8
-
SSDEEP
1536:0hhLVGr2fe7G8DiSYXg+vtbfVeHZe8LZulThAhJ3+OkeWtpHeaD0:0hhxGrf7VQbVBcD+OkeWtpHeaD0
Malware Config
Signatures
Files
-
bc86e12058a8a62bb22cfbf535a9924ecc508bc1ffdbb3c95a357b69eb57f9d9.exe windows x86
428accfa9abaed56618bcecd11c9df32
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindClose
GetCurrentDirectoryA
OutputDebugStringA
CopyFileA
SetFileAttributesA
GetModuleFileNameA
CreateDirectoryA
CreateFileA
WriteFile
CloseHandle
DeleteFileA
WaitForSingleObject
CreateSemaphoreA
GetLastError
GetCommandLineA
CreateToolhelp32Snapshot
Process32First
Process32Next
TerminateProcess
OpenProcess
GetFileSize
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
SetFilePointer
ReadFile
FindNextFileA
GetVersionExA
FlushViewOfFile
GetDiskFreeSpaceA
lstrcmpA
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
MultiByteToWideChar
WideCharToMultiByte
lstrcmpiA
SetEndOfFile
GetLocaleInfoA
FindFirstFileA
SetCurrentDirectoryA
CreateThread
TerminateThread
Sleep
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
LoadLibraryA
FlushFileBuffers
SetStdHandle
InitializeCriticalSection
GetOEMCP
GetACP
GetCPInfo
GetConsoleMode
GetConsoleCP
HeapSize
GetFileAttributesA
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
HeapAlloc
HeapFree
GetProcessHeap
GetStartupInfoA
RaiseException
GetProcAddress
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
VirtualFree
VirtualAlloc
HeapReAlloc
HeapDestroy
HeapCreate
ExitProcess
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
advapi32
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
shell32
ShellExecuteA
SHFileOperationA
wininet
InternetOpenA
HttpQueryInfoA
InternetReadFile
InternetOpenUrlA
InternetCloseHandle
ws2_32
WSAStartup
WSACleanup
gethostbyname
inet_ntoa
socket
htons
inet_addr
closesocket
recv
send
connect
Sections
.text Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ