Static task
static1
Behavioral task
behavioral1
Sample
bc224201dc7f310f7f596578c2b67e18ef8990ca9138096a1286b26d74c70050.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bc224201dc7f310f7f596578c2b67e18ef8990ca9138096a1286b26d74c70050.exe
Resource
win10v2004-20220812-en
General
-
Target
bc224201dc7f310f7f596578c2b67e18ef8990ca9138096a1286b26d74c70050
-
Size
1.1MB
-
MD5
d271d24d1e5847a797f914eb20bdc4ca
-
SHA1
c81c3c69fc0351264cfed60934bbfb635248e3f9
-
SHA256
bc224201dc7f310f7f596578c2b67e18ef8990ca9138096a1286b26d74c70050
-
SHA512
65ce8bcdddb12057be56bfc67df2b450479b3c5dd5f87ced1f3285bcc3a830705bb7a3bd437b3661b9d1b2353fcef4349ace470b164b5654bf37ec0c03af91d5
-
SSDEEP
24576:Y43cMJRD1eB+PM5ac9UKmTj5Xr63z7EFY31BvnblVXpcMLJObgz:Y43nD1dEMRKmfZ2z4OBPblV/LJOa
Malware Config
Signatures
Files
-
bc224201dc7f310f7f596578c2b67e18ef8990ca9138096a1286b26d74c70050.exe windows x86
85084207fcb5aa775bed7bdb5ac7a431
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileSize
GetDevicePowerState
PeekConsoleInputA
GetDllDirectoryA
GetConsoleOutputCP
GetFileAttributesExA
GetModuleFileNameA
FindFirstVolumeMountPointA
GetProcessPriorityBoost
WriteConsoleOutputCharacterA
ReadConsoleOutputA
SetLocalPrimaryComputerNameA
GetCurrentThreadId
SetFileAttributesA
GetComputerNameA
QueueUserAPC
AllocConsole
OpenWaitableTimerA
GetFileTime
LocalFlags
TermsrvAppInstallMode
GetFullPathNameA
RequestDeviceWakeup
GetModuleHandleA
OpenMutexA
CommConfigDialogA
SetConsoleTitleA
WriteConsoleA
SetFirmwareEnvironmentVariableA
SetConsoleHardwareState
FlushConsoleInputBuffer
WriteConsoleOutputA
GetProcessShutdownParameters
UnlockFileEx
GetPrivateProfileSectionNamesA
CreateSocketHandle
OpenSemaphoreA
DeleteFileA
CreateFileA
DuplicateConsoleHandle
IsProcessorFeaturePresent
GetThreadSelectorEntry
CreateDirectoryExA
GetVolumePathNameA
WaitForSingleObjectEx
HeapCreate
QueryPerformanceCounter
TerminateJobObject
GetDriveTypeA
WriteConsoleOutputAttribute
SetConsoleInputExeNameA
GetSystemWindowsDirectoryA
VirtualAlloc
GetLogicalDriveStringsA
Module32First
WriteConsoleInputA
GetCurrentProcess
LCMapStringA
GetLocaleInfoA
EnumUILanguagesA
ShowConsoleCursor
GetModuleFileNameA
SetFileAttributesA
VirtualQuery
DefineDosDeviceA
HeapSize
IsBadWritePtr
BuildCommDCBAndTimeoutsA
SetDefaultCommConfigA
GetConsoleWindow
GetProcAddress
Process32First
GetProcessTimes
FindVolumeMountPointClose
GetConsoleKeyboardLayoutNameA
GetConsoleAliasesA
BeginUpdateResourceA
GlobalUnWire
GetComputerNameExA
GetUserDefaultLangID
CompareStringA
GetThreadPriorityBoost
FillConsoleOutputCharacterA
IsBadStringPtrA
GetProfileSectionA
ReplaceFile
GetWindowsDirectoryA
GlobalFix
QueryInformationJobObject
GetLogicalDriveStringsA
GetCurrentProcess
GetVolumePathNameA
SetThreadIdealProcessor
GetStringTypeExA
OpenThread
EnumSystemGeoID
GetProfileSectionA
TerminateJobObject
GetExitCodeProcess
GetFileSizeEx
GetFullPathNameA
GetCurrentProcessId
ClearCommBreak
RemoveDirectoryA
ExitProcess
SetConsoleActiveScreenBuffer
RemoveDirectoryA
WriteProfileSectionA
GlobalReAlloc
ClearCommError
FlushViewOfFile
GetVolumePathNameA
lstrcat
VirtualAllocEx
ReadConsoleOutputCharacterA
OpenEventA
GetConsoleCommandHistoryA
QueryMemoryResourceNotification
GetConsoleScreenBufferInfo
GetDiskFreeSpaceA
GetSystemDirectoryA
GetVersionExA
GetLocaleInfoA
EscapeCommFunction
ClearCommError
ResetEvent
CreateDirectoryExW
GetCommTimeouts
HeapSize
GetCurrentDirectoryA
GetProcessIoCounters
GetWriteWatch
ntdll
RtlGetLastWin32Error
user32
DestroyWindow
advapi32
AddAccessDeniedAceEx
Sections
.text Size: 359KB - Virtual size: 360KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 772KB - Virtual size: 776KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ