Static task
static1
Behavioral task
behavioral1
Sample
be6a0ba502fcf3d73a9adf08549653f6f5314ed6eec766084d4034388263b0ea.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
be6a0ba502fcf3d73a9adf08549653f6f5314ed6eec766084d4034388263b0ea.exe
Resource
win10v2004-20220812-en
General
-
Target
be6a0ba502fcf3d73a9adf08549653f6f5314ed6eec766084d4034388263b0ea
-
Size
140KB
-
MD5
97ed7813dad45bdf51856fa8c1bb3cae
-
SHA1
7e2c258b8e00af553bffcb88aaf31a99d790c627
-
SHA256
be6a0ba502fcf3d73a9adf08549653f6f5314ed6eec766084d4034388263b0ea
-
SHA512
f55d3d18c08144c627e2e5f3e7362d67c3cdfca2681489fe6326ae593a858cc0104930b9d5094415f17ced748beeadb456fc41dcf5ebf5d6a66a77723a421d61
-
SSDEEP
3072:c3+y09eoZB19lx8WiE7TNALjuKFZZZmSyKZoOjzSjJR6AQADw/9z:c90bzlxltayKmVcV
Malware Config
Signatures
Files
-
be6a0ba502fcf3d73a9adf08549653f6f5314ed6eec766084d4034388263b0ea.exe windows x86
c2dee2735899d4fa97722349a465557f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OpenProcess
CompareStringA
CompareStringW
SetEnvironmentVariableA
DeviceIoControl
WaitForSingleObject
GetTempPathA
WritePrivateProfileStringA
PeekNamedPipe
ReadFile
CreatePipe
DuplicateHandle
WaitForMultipleObjects
DisconnectNamedPipe
DeleteFileA
RemoveDirectoryA
GetDriveTypeA
FindNextFileA
lstrcmpA
FindFirstFileA
FindClose
CreateToolhelp32Snapshot
Process32First
Process32Next
TerminateProcess
GetProcessHeap
HeapAlloc
GetTickCount
GetCurrentProcessId
ExitThread
GetComputerNameA
GetVersion
GetVersionExA
GlobalMemoryStatus
GetSystemInfo
GetPrivateProfileStringA
lstrlenA
TerminateThread
GetSystemDirectoryA
FindResourceA
SizeofResource
LoadResource
LockResource
CreateFileA
WriteFile
CreateThread
VirtualAllocEx
WriteProcessMemory
ReadProcessMemory
GetExitCodeProcess
IsBadCodePtr
IsBadReadPtr
SetStdHandle
SetUnhandledExceptionFilter
GetStringTypeW
GetShortPathNameA
GetEnvironmentVariableA
lstrcpyA
lstrcatA
GetCurrentProcess
SetPriorityClass
GetCurrentThread
SetThreadPriority
CreateProcessA
ResumeThread
LoadLibraryA
GetProcAddress
GetWindowsDirectoryA
CreateDirectoryA
GetModuleFileNameA
CopyFileA
WinExec
Sleep
CreateMutexA
GetLastError
VirtualFreeEx
GetStringTypeA
LCMapStringW
LCMapStringA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetACP
HeapReAlloc
HeapSize
RaiseException
GetCommandLineA
InterlockedIncrement
InterlockedDecrement
WideCharToMultiByte
MultiByteToWideChar
LocalFree
SetEvent
GetCurrentThreadId
SuspendThread
CreateEventA
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
SetLastError
lstrcpynA
GetModuleHandleA
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
lstrcmpiA
GlobalGetAtomNameA
FreeLibrary
LocalAlloc
TlsAlloc
GlobalFree
GlobalUnlock
GlobalHandle
GlobalLock
GlobalReAlloc
GlobalAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
GetProcessVersion
GlobalFlags
GetCPInfo
GetOEMCP
SetFilePointer
FlushFileBuffers
SetEndOfFile
GetFileAttributesA
ExitProcess
HeapFree
RtlUnwind
Beep
GetTimeZoneInformation
GetSystemTime
GetLocalTime
CloseHandle
user32
GrayStringA
DrawTextA
TabbedTextOutA
DestroyMenu
PostQuitMessage
ClientToScreen
PtInRect
GetClassNameA
FindWindowExA
GetDC
ReleaseDC
GetSysColorBrush
LoadCursorA
IsWindowEnabled
ShowWindow
MessageBoxA
ExitWindowsEx
SystemParametersInfoA
wsprintfA
SendMessageA
GetDesktopWindow
EnumChildWindows
GetWindowLongA
GetWindowThreadProcessId
SetWindowsHookExA
GetCursorPos
PeekMessageA
IsWindowVisible
ValidateRect
CallNextHookEx
GetKeyState
GetActiveWindow
DispatchMessageA
TranslateMessage
GetMessageA
LoadStringA
GetNextDlgTabItem
GetParent
GetFocus
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
GetSystemMetrics
GetWindowRect
GetWindowPlacement
IsIconic
RegisterWindowMessageA
SetWindowPos
SetWindowLongA
GetWindow
SetForegroundWindow
GetForegroundWindow
GetLastActivePopup
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
CallWindowProcA
GetPropA
UnhookWindowsHookEx
SetPropA
GetClassLongA
CreateWindowExA
DestroyWindow
GetDlgCtrlID
GetWindowTextA
GetDlgItem
GetMenuItemID
GetSubMenu
GetMenuItemCount
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
EnableWindow
CopyRect
GetClientRect
AdjustWindowRectEx
SetFocus
GetSysColor
MapWindowPoints
PostMessageA
LoadIconA
SetWindowTextA
gdi32
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
DeleteObject
GetStockObject
SelectObject
RestoreDC
CreateBitmap
GetClipBox
SetTextColor
SetBkColor
GetObjectA
GetDeviceCaps
SaveDC
DeleteDC
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegCreateKeyA
RegSetValueA
RegSetValueExA
RegCloseKey
OpenSCManagerA
DeleteService
ControlService
OpenServiceA
StartServiceA
CreateServiceA
CloseServiceHandle
RegDeleteKeyA
shell32
ShellExecuteA
ws2_32
inet_ntoa
gethostbyname
WSAStartup
send
closesocket
select
connect
htons
inet_addr
socket
sendto
setsockopt
WSASocketA
htonl
WSAGetLastError
recv
winmm
mciSendStringA
comctl32
ord17
Sections
.text Size: 92KB - Virtual size: 91KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 275KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ