Static task
static1
Behavioral task
behavioral1
Sample
bda8a19ada642d94d74218ffbd3392970468f1e2376394c5ce2cd0792486c6ff.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
bda8a19ada642d94d74218ffbd3392970468f1e2376394c5ce2cd0792486c6ff.exe
Resource
win10v2004-20221111-en
General
-
Target
bda8a19ada642d94d74218ffbd3392970468f1e2376394c5ce2cd0792486c6ff
-
Size
479KB
-
MD5
5cd548d0c295faceab5942a54f05705b
-
SHA1
770fb9bf36ff93d5f25c05a0690ed815487b6779
-
SHA256
bda8a19ada642d94d74218ffbd3392970468f1e2376394c5ce2cd0792486c6ff
-
SHA512
3c17333d50ddb10fc5832a6ca5fc9ebd881e448df072f6690327d4c6655e6c27553c061107d393cb7b42f11f4623681469301db0228e7bf16acb0beb99a52157
-
SSDEEP
12288:HNpWsYT9BGzBBa2596X20AC8iLNso+ZxfV+z98xbhcP:i2BXSGxC8CNsPZxd+z98xbSP
Malware Config
Signatures
Files
-
bda8a19ada642d94d74218ffbd3392970468f1e2376394c5ce2cd0792486c6ff.exe windows x86
bb710784fa75d3928a47941d5a58cb09
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
OleInitialize
OleUninitialize
CoInitialize
CoCreateInstance
CoUninitialize
CoCreateGuid
shlwapi
SHDeleteKeyA
PathFileExistsA
wininet
InternetCanonicalizeUrlA
InternetReadFile
InternetGetLastResponseInfoA
InternetConnectA
HttpOpenRequestA
HttpSendRequestA
HttpQueryInfoA
InternetTimeToSystemTime
InternetSetOptionA
InternetCrackUrlA
InternetOpenA
InternetOpenUrlA
InternetCloseHandle
InternetGetConnectedState
user32
SendDlgItemMessageA
FillRect
GetDlgItemTextA
GetClassInfoExA
LoadCursorA
RegisterClassExA
GetSystemMetrics
CreateWindowExA
CharUpperA
CharLowerA
CharNextA
GetClassNameA
SetWindowLongA
UpdateWindow
SetTimer
RedrawWindow
GetMessageA
TranslateMessage
DispatchMessageA
DialogBoxParamA
CharPrevA
GetWindowTextA
GetClientRect
SetWindowRgn
DestroyWindow
GetWindowLongA
ClientToScreen
GetFocus
DefWindowProcA
GetForegroundWindow
GetCursorPos
PtInRect
InvalidateRect
BeginPaint
EndPaint
SetWindowTextA
LoadIconA
SendMessageA
GetSystemMenu
EnableMenuItem
SetDlgItemTextA
GetDlgItem
SetForegroundWindow
SetActiveWindow
SetFocus
ShowWindow
GetWindowRect
ScreenToClient
SetWindowPos
EndDialog
LoadStringA
GetDC
ReleaseDC
DrawTextW
MessageBoxA
EnumWindows
oleaut32
SysAllocString
SysFreeString
VariantInit
VariantClear
SysAllocStringLen
gdi32
CreatePatternBrush
GetDeviceCaps
CreateBitmap
GetObjectA
BitBlt
StretchBlt
CombineRgn
SetTextColor
CreateCompatibleDC
SelectObject
GetTextExtentPointW
CreateFontW
DeleteObject
GetPixel
CreateRectRgn
TextOutW
GetTextExtentPoint32A
SetPixel
GetStockObject
SetBkMode
DeleteDC
advapi32
ConvertSidToStringSidA
IsValidSid
GetLengthSid
InitializeAcl
AddAccessDeniedAce
AddAccessAllowedAce
RegOpenKeyA
InitializeSecurityDescriptor
RegSetValueA
RegQueryValueExA
OpenProcessToken
GetTokenInformation
EqualSid
RegQueryValueA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegOpenKeyExA
RegDeleteValueA
FreeSid
GetUserNameA
SetSecurityDescriptorOwner
SetSecurityDescriptorDacl
LookupAccountNameA
AllocateAndInitializeSid
shell32
SHGetFolderPathW
SHGetSpecialFolderPathA
ShellExecuteExA
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
msimg32
TransparentBlt
kernel32
RtlUnwind
TerminateProcess
UnhandledExceptionFilter
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
SetUnhandledExceptionFilter
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
GetCurrentDirectoryA
IsDebuggerPresent
GetConsoleCP
GetConsoleMode
HeapCreate
FileTimeToLocalFileTime
GetModuleHandleW
ExitProcess
GetCommandLineA
GetStartupInfoA
GetFileType
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
SetEnvironmentVariableA
GetFullPathNameA
SetEndOfFile
GetTimeZoneInformation
VirtualFree
VirtualAlloc
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
SetHandleCount
GetStdHandle
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableW
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetStringTypeA
GetStringTypeW
FlushFileBuffers
LCMapStringA
LCMapStringW
CompareStringA
EnterCriticalSection
CreateNamedPipeA
GetSystemInfo
GetFileAttributesA
GetDriveTypeA
GetTempPathA
GetTempFileNameA
InterlockedDecrement
InterlockedIncrement
RaiseException
GetLastError
lstrcpyA
lstrlenA
CloseHandle
CreateMutexA
OpenMutexA
ReadFile
PeekNamedPipe
WriteFile
ConnectNamedPipe
CompareStringW
Process32Next
OpenProcess
Process32First
CreateToolhelp32Snapshot
GetVersionExA
FreeLibrary
GetProcAddress
LoadLibraryA
WideCharToMultiByte
RemoveDirectoryA
FindClose
DeleteFileA
FindNextFileA
FindFirstFileA
GetModuleFileNameA
GetDiskFreeSpaceA
GetDiskFreeSpaceExA
GetCurrentProcess
GetModuleHandleA
ExpandEnvironmentStringsA
MultiByteToWideChar
GetFileSize
CreateFileA
Sleep
CreateDirectoryA
GetPrivateProfileStringA
WritePrivateProfileStringA
LocalFree
CompareFileTime
SystemTimeToFileTime
GetFileTime
GetTickCount
SizeofResource
LockResource
LoadResource
FindResourceA
FindResourceExA
SetFileAttributesA
SetFilePointer
FileTimeToSystemTime
GetFileInformationByHandle
GetFileSizeEx
GetSystemTimeAsFileTime
GetSystemTime
GetLocaleInfoA
CopyFileA
FreeResource
rpcrt4
UuidToStringA
RpcStringFreeA
crypt32
CertGetNameStringW
CryptMsgGetParam
CryptQueryObject
CertFreeCertificateContext
CryptMsgClose
CertCloseStore
CertFindCertificateInStore
Sections
.text Size: 338KB - Virtual size: 338KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 101KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 82KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE