Static task
static1
Behavioral task
behavioral1
Sample
bf48387a48e9b5a5c728372092d03c664ed026afebe7fc2458e45404403514a0.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
bf48387a48e9b5a5c728372092d03c664ed026afebe7fc2458e45404403514a0.exe
Resource
win10v2004-20220901-en
General
-
Target
bf48387a48e9b5a5c728372092d03c664ed026afebe7fc2458e45404403514a0
-
Size
203KB
-
MD5
067a6e1fb77ee369754ce2860c55e280
-
SHA1
63f0bd89a56293ab16fb1bce61880d2ad95eccad
-
SHA256
bf48387a48e9b5a5c728372092d03c664ed026afebe7fc2458e45404403514a0
-
SHA512
052b38a3a4acd5bdd8c917a4de7d1ab4fb4b70888d826b92737d18d1b5c551cc6a09768e2c0ccf7b643f6dbf68c5437da5be452e43396bf05805976ec0f89e0f
-
SSDEEP
6144:1nGi9rzSY02u0CRXVMTR3NwGH8Qm8Fgz9:1GOb050CFVMTXwGHRgz
Malware Config
Signatures
Files
-
bf48387a48e9b5a5c728372092d03c664ed026afebe7fc2458e45404403514a0.exe windows x86
275c2552dd4a77de98bbeabdef658f40
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteFile
SetFilePointer
CreateFileA
TerminateThread
OutputDebugStringA
GetCurrentProcess
SetFileAttributesA
GetModuleFileNameA
DeleteFileA
CreateProcessA
GetPrivateProfileStringA
GetSystemDefaultUILanguage
ReleaseMutex
GetTempPathA
SetErrorMode
GetLastError
CreateMutexA
SetUnhandledExceptionFilter
SetThreadPriority
CreateThread
InterlockedExchange
GetCurrentProcessId
LocalAlloc
FreeLibrary
Sleep
CancelIo
SetEvent
lstrcpyA
ResetEvent
WaitForSingleObject
CloseHandle
CreateEventA
LoadLibraryA
GetProcAddress
VirtualFree
DeleteCriticalSection
OpenEventA
InitializeCriticalSection
RtlUnwind
RaiseException
ExitProcess
TerminateProcess
GetCurrentThreadId
TlsSetValue
TlsGetValue
ExitThread
HeapFree
HeapAlloc
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
TlsAlloc
SetLastError
EnterCriticalSection
LeaveCriticalSection
HeapReAlloc
HeapSize
UnhandledExceptionFilter
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualAlloc
IsBadWritePtr
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
InterlockedDecrement
InterlockedIncrement
IsBadReadPtr
IsBadCodePtr
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
GetCPInfo
GetACP
GetOEMCP
LCMapStringA
LCMapStringW
SetStdHandle
FlushFileBuffers
user32
MessageBoxA
ExitWindowsEx
wsprintfA
advapi32
RegQueryValueExA
RegDeleteKeyA
RegOpenKeyA
RegDeleteValueA
RegSetValueExA
RegCloseKey
OpenSCManagerA
OpenServiceA
DeleteService
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyExA
shell32
ShellExecuteA
SHGetSpecialFolderPathA
msvcrt
_strset
Sections
PAGE Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 125KB - Virtual size: 135KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 64KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ