Static task
static1
Behavioral task
behavioral1
Sample
bd169900f70cb1d8dbcded12f37f94118e636b4e93344f99ef5300962e7374ae.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bd169900f70cb1d8dbcded12f37f94118e636b4e93344f99ef5300962e7374ae.exe
Resource
win10v2004-20220901-en
General
-
Target
bd169900f70cb1d8dbcded12f37f94118e636b4e93344f99ef5300962e7374ae
-
Size
544KB
-
MD5
ad43dac9aa7a8be58b66ec6a7869dedb
-
SHA1
fdfe6dd3f5410253c7e3cf9522d63347d6911f6a
-
SHA256
bd169900f70cb1d8dbcded12f37f94118e636b4e93344f99ef5300962e7374ae
-
SHA512
38419ff91e57dfd5401cd6ba50fac24dab625f50e52fe33b7bdec307473a1a3cab50c69fc77b80f3efa369d7b06aca3ca7188dccd8c981a52b81150f309726fb
-
SSDEEP
3072:Q2N/LzV2oqdxnCG2Um0m/9AJvsQPSN2LhaMstRyksIz0S66t4dRk3NIkII4RKod/:QNoI2U4VIqwUM3Sf4HNbQ/FktRRies
Malware Config
Signatures
Files
-
bd169900f70cb1d8dbcded12f37f94118e636b4e93344f99ef5300962e7374ae.exe windows x86
4450b53726ee9c67ff8c34237d39a8b1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemDirectoryA
GetModuleHandleA
CreateThread
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
lstrcatA
CreateMutexA
SetErrorMode
GetModuleFileNameA
GetCurrentDirectoryA
GetCurrentProcess
CreateFileA
GetFileSize
ReadFile
CloseHandle
lstrlenA
lstrcpyA
FindFirstFileA
FindClose
GetLastError
lstrcmpiA
GetVersionExA
LoadLibraryA
GetProcAddress
GetProcessHeap
SetEndOfFile
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
SetFilePointer
FlushFileBuffers
SetStdHandle
InterlockedExchange
RtlUnwind
HeapReAlloc
VirtualAlloc
InitializeCriticalSection
GetCPInfo
GetOEMCP
GetACP
LCMapStringW
MultiByteToWideChar
LCMapStringA
VirtualQuery
GetSystemInfo
VirtualProtect
FreeLibrary
GetWindowsDirectoryA
OutputDebugStringA
lstrcpynA
GetStartupInfoA
GetCommandLineA
GetLocalTime
ExitProcess
WriteFile
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
TlsFree
SetLastError
TlsSetValue
TlsGetValue
TlsAlloc
HeapDestroy
HeapCreate
VirtualFree
HeapFree
EnterCriticalSection
LeaveCriticalSection
HeapAlloc
advapi32
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
RegDeleteValueA
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
AdjustTokenPrivileges
gdi32
GetDeviceCaps
CreateFontIndirectA
SelectObject
CreateCompatibleDC
DeleteDC
StretchBlt
GetObjectA
DeleteObject
user32
MessageBoxA
LoadStringA
LoadImageA
wsprintfA
SystemParametersInfoA
SendDlgItemMessageA
SetWindowTextA
GetWindowLongA
PostMessageA
GetParent
SetDlgItemTextA
GetDlgItem
SendMessageA
ShowWindow
SetWindowLongA
GetAsyncKeyState
ExitWindowsEx
EnumWindows
GetWindowTextA
GetClassNameA
SetForegroundWindow
SetFocus
CharLowerA
GetDC
ReleaseDC
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
comctl32
CreatePropertySheetPageA
PropertySheetA
ord17
Sections
.text Size: 49KB - Virtual size: 49KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 3KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 407KB - Virtual size: 407KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
`� Size: 83KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE