Static task
static1
Behavioral task
behavioral1
Sample
bc4a78809606ad7e38b04cd0beaa6474fd1ac1e52247cfc673aab31c86a2e6b0.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
bc4a78809606ad7e38b04cd0beaa6474fd1ac1e52247cfc673aab31c86a2e6b0.exe
Resource
win10v2004-20221111-en
General
-
Target
bc4a78809606ad7e38b04cd0beaa6474fd1ac1e52247cfc673aab31c86a2e6b0
-
Size
401KB
-
MD5
2f26ef77967e86bc0a997f2ec9f03f5c
-
SHA1
482480658412a729e05fe15281e7e8c94708a047
-
SHA256
bc4a78809606ad7e38b04cd0beaa6474fd1ac1e52247cfc673aab31c86a2e6b0
-
SHA512
8c068fa29d1c811070608df5acbcccbd8d9720cc183eb36d643e94effa35133b0ad2354f1bf331d662fd10bdb2e61aea960be0162940e770d264232f21e3ef27
-
SSDEEP
12288:LAx6uH+Zli3G5DBXWufF2MrNrd1zFbugaB+3w:LAdYi3KDkufF2GXFbutK
Malware Config
Signatures
Files
-
bc4a78809606ad7e38b04cd0beaa6474fd1ac1e52247cfc673aab31c86a2e6b0.exe windows x86
205aa9719c5fbc68d07c2bce4c0882af
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleFileNameA
GetProcAddress
GetModuleHandleA
TerminateProcess
GetCurrentProcess
LoadLibraryA
RtlUnwind
InterlockedExchange
VirtualQuery
HeapReAlloc
HeapAlloc
HeapFree
VirtualAlloc
GetModuleHandleW
ResetWriteWatch
GetProfileStringA
SetCriticalSectionSpinCount
GetSystemInfo
Toolhelp32ReadProcessMemory
ConnectNamedPipe
ReadFile
WriteFileGather
GetFullPathNameA
GlobalAddAtomA
ReadConsoleOutputW
GetPrivateProfileSectionNamesA
SetConsoleTitleA
GlobalSize
PulseEvent
GetWriteWatch
GetProcessPriorityBoost
CreateSemaphoreW
RtlZeroMemory
lstrcpyA
ReadProcessMemory
VirtualAllocEx
GetProfileSectionW
SetConsoleTitleW
GetExitCodeProcess
Module32Next
GlobalFix
GetProfileStringW
OpenFileMappingW
LockResource
GetTimeFormatW
lstrcmpiW
DeleteFiber
SetWaitableTimer
SetEnvironmentVariableA
SignalObjectAndWait
EnumDateFormatsA
GlobalAddAtomW
lstrcpynA
VirtualProtectEx
GetConsoleOutputCP
FindResourceExW
TlsAlloc
LoadModule
MoveFileExA
GetNamedPipeHandleStateA
MulDiv
GetLogicalDriveStringsA
SetSystemTime
lstrcpyn
CompareFileTime
CreateConsoleScreenBuffer
WriteProfileSectionW
DisableThreadLibraryCalls
LeaveCriticalSection
ExpandEnvironmentStringsW
LockFile
GetPrivateProfileIntW
GetPriorityClass
FlushInstructionCache
FlushFileBuffers
EnumSystemLocalesW
UpdateResourceA
SystemTimeToTzSpecificLocalTime
IsDebuggerPresent
GetProcessHeap
EnumCalendarInfoExA
LocalCompact
InterlockedExchangeAdd
DefineDosDeviceA
WriteFile
TlsSetValue
OpenEventW
FileTimeToDosDateTime
HeapSize
GetTempPathA
SetConsoleMode
comdlg32
GetOpenFileNameA
ChooseColorW
PageSetupDlgW
ReplaceTextA
FindTextW
FindTextA
GetSaveFileNameA
GetSaveFileNameW
PageSetupDlgA
GetFileTitleW
ChooseFontW
ReplaceTextW
ChooseFontA
ChooseColorA
PrintDlgW
LoadAlterBitmap
PrintDlgA
GetFileTitleA
wininet
InternetGetLastResponseInfoW
IsUrlCacheEntryExpiredA
FtpOpenFileA
SetUrlCacheConfigInfoW
Sections
.text Size: 104KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 276KB - Virtual size: 275KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE