Static task
static1
Behavioral task
behavioral1
Sample
bebddea0239495539739b0c25bb034d83c3866aae2ee4ffa4a2bf0e3052eb8b7.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
bebddea0239495539739b0c25bb034d83c3866aae2ee4ffa4a2bf0e3052eb8b7.exe
Resource
win10v2004-20221111-en
General
-
Target
bebddea0239495539739b0c25bb034d83c3866aae2ee4ffa4a2bf0e3052eb8b7
-
Size
253KB
-
MD5
7975032fb3d2a7e3e76258a7bf6ea163
-
SHA1
86c0744ad5a5dd2132cfe5e16aae68b3b4eb2a44
-
SHA256
bebddea0239495539739b0c25bb034d83c3866aae2ee4ffa4a2bf0e3052eb8b7
-
SHA512
00c2cf450f07c72bec0a9dcc49611899cdd4b308f998745acabed916fa48e66414d8d19038d8b88e53e1f1922b73babafd31454e09f2aebb89f1c3eba654b01a
-
SSDEEP
6144:dVzM3QlT83FzDBSgPNs8kW5VdKsQEQ0EzKhOs:wPDBS2NsvW5TK3EQ9z
Malware Config
Signatures
Files
-
bebddea0239495539739b0c25bb034d83c3866aae2ee4ffa4a2bf0e3052eb8b7.exe windows x86
a33f3b2e3e403a0d7fee72e9e5a22cc4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThread
InitializeCriticalSection
FindAtomW
WaitForSingleObjectEx
GetTimeZoneInformation
EnumSystemLocalesA
HeapAlloc
LoadLibraryA
GetCPInfo
TlsSetValue
CompareStringA
EnumCalendarInfoExW
EnterCriticalSection
GetEnvironmentStringsW
InterlockedExchange
TlsAlloc
GetDateFormatA
HeapCreate
HeapDestroy
CompareStringW
WideCharToMultiByte
GetLocaleInfoW
HeapSize
GetOEMCP
GetDriveTypeW
IsValidLocale
GetSystemInfo
GetVersionExA
GetProcAddress
FreeEnvironmentStringsW
GetUserDefaultLCID
HeapFree
CreateEventW
GetLocaleInfoA
EnumTimeFormatsW
LCMapStringA
VirtualQuery
TlsGetValue
LCMapStringW
VirtualFree
GetEnvironmentStrings
LeaveCriticalSection
GetACP
GetTimeFormatA
HeapReAlloc
TlsFree
ExitProcess
FreeEnvironmentStringsA
DeleteCriticalSection
VirtualAlloc
TerminateProcess
QueryPerformanceCounter
GetCurrentProcess
SetHandleCount
GetModuleHandleA
GetStringTypeA
MultiByteToWideChar
SetEnvironmentVariableA
GetCurrentThreadId
VirtualProtect
IsBadWritePtr
GetLastError
GetStringTypeW
GetCurrentProcessId
GetModuleFileNameA
SetLastError
GetFileType
CreateMutexA
GetTickCount
IsValidCodePage
GetCommandLineA
GetStdHandle
WriteFile
UnhandledExceptionFilter
RtlUnwind
GetStartupInfoA
GetSystemTimeAsFileTime
user32
ArrangeIconicWindows
RegisterClassExW
GetOpenClipboardWindow
SetTimer
ChildWindowFromPoint
MapVirtualKeyA
DrawTextExA
ChangeDisplaySettingsA
GetWindowModuleFileNameW
VkKeyScanW
wsprintfA
FreeDDElParam
GetUpdateRgn
UnhookWinEvent
LoadCursorW
SetWindowRgn
GetClipboardOwner
PtInRect
CreateDialogParamW
CascadeWindows
GetSystemMetrics
GetSysColor
PackDDElParam
gdi32
CreateDIBitmap
CreateRectRgn
CreatePen
PatBlt
comdlg32
PrintDlgA
FindTextW
GetSaveFileNameA
PrintDlgW
GetOpenFileNameA
Sections
.text Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 137KB - Virtual size: 160KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ