xfbc
Static task
static1
Behavioral task
behavioral1
Sample
ba5daa0275bf694e425efbb54697397b81ac46a70109742628cb4b007e40d084.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ba5daa0275bf694e425efbb54697397b81ac46a70109742628cb4b007e40d084.dll
Resource
win10v2004-20220812-en
General
-
Target
ba5daa0275bf694e425efbb54697397b81ac46a70109742628cb4b007e40d084
-
Size
60KB
-
MD5
9e13971a882a024104cc73561507a424
-
SHA1
a93c4ea4fc08c7024eff6b96bfd764d2f72cccff
-
SHA256
ba5daa0275bf694e425efbb54697397b81ac46a70109742628cb4b007e40d084
-
SHA512
eee7e7a787d7d99831f17a306fdc9055b3375eb70dcecc61f6e6465f3906c68bfa5899c7829e5d061b37378abbdd91991eb734be6913238bf30026a1460bb4eb
-
SSDEEP
1536:NZ4fvCZgGHP04t67FKN+9PJxkqvHmbuoo:SCZgQw7ouPJZz
Malware Config
Signatures
Files
-
ba5daa0275bf694e425efbb54697397b81ac46a70109742628cb4b007e40d084.dll windows x86
40343bf3dfffffec5547bb48bb0dca61
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FileTimeToSystemTime
GetTimeZoneInformation
SetEndOfFile
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
CreateFileA
CompareStringW
CompareStringA
InterlockedExchange
HeapSize
RtlUnwind
InitializeCriticalSection
SetFilePointer
VirtualQuery
GetSystemInfo
VirtualProtect
VirtualAlloc
SetStdHandle
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetCPInfo
UnhandledExceptionFilter
SetEnvironmentVariableW
SetEnvironmentVariableA
FlushFileBuffers
TlsGetValue
TlsSetValue
TlsFree
SetLastError
TlsAlloc
ReadFile
FileTimeToLocalFileTime
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
WideCharToMultiByte
DeleteCriticalSection
HeapFree
HeapReAlloc
HeapAlloc
GetVersionExA
CreateThread
GetCurrentThreadId
ExitThread
GetFileAttributesA
MultiByteToWideChar
LeaveCriticalSection
EnterCriticalSection
GetCurrentProcess
TerminateProcess
GetModuleHandleA
ExitProcess
FindClose
FindNextFileA
FindFirstFileA
GetExitCodeThread
LoadLibraryA
GetProcAddress
FreeLibrary
CreateProcessA
WaitForSingleObject
GetExitCodeProcess
CloseHandle
GetLastError
FormatMessageA
LocalFree
QueryPerformanceFrequency
QueryPerformanceCounter
GetModuleFileNameA
GetProcessHeap
GetCurrencyFormatA
OutputDebugStringA
GetDriveTypeA
GetFullPathNameA
GetCurrentDirectoryA
WriteFile
Beep
advapi32
RegOpenKeyExA
RegEnumKeyA
RegQueryValueExA
RegCloseKey
Exports
Exports
Sections
.text Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 888B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 538B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ