Static task
static1
Behavioral task
behavioral1
Sample
bdd48cc6c62350b5b36ad7baae72f021b1b51d1b5803540fd61c57ebab403783.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bdd48cc6c62350b5b36ad7baae72f021b1b51d1b5803540fd61c57ebab403783.exe
Resource
win10v2004-20220812-en
General
-
Target
bdd48cc6c62350b5b36ad7baae72f021b1b51d1b5803540fd61c57ebab403783
-
Size
507KB
-
MD5
7113e5cc6e7d973dfd13f9ff84e2e4c2
-
SHA1
a073b8a5e756f5b80505db5cabd4d051d1335c9b
-
SHA256
bdd48cc6c62350b5b36ad7baae72f021b1b51d1b5803540fd61c57ebab403783
-
SHA512
7a3fe29c4c1ebeecdad53e4762b7187d4f321c81982611ede7b3923c0a24a380580e6b3cb04df9dcaea224ac6fb80546e3477d40c8d4e2031060488d04a03428
-
SSDEEP
12288:0lenKGvE+mJK45I+Jj/ra/mWx2AcQ/q9zR2rzH1cWWW+6RZ:BKupg/hJz+emBU9szVcWWWnR
Malware Config
Signatures
Files
-
bdd48cc6c62350b5b36ad7baae72f021b1b51d1b5803540fd61c57ebab403783.exe windows x86
fde2e74e46f24d77b9993d44f29adb17
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
AttachThreadInput
DdeCreateStringHandleW
GetCaretBlinkTime
ShowCaret
GetUpdateRect
PeekMessageW
HideCaret
GetDlgItem
DdeKeepStringHandle
GetSubMenu
RegisterClassExA
CreateIcon
SetMenuContextHelpId
GetDlgCtrlID
TrackPopupMenu
EndMenu
CreateMDIWindowW
EnableScrollBar
SetWindowLongW
RegisterClassA
SetMenu
MapDialogRect
comctl32
InitCommonControlsEx
kernel32
InterlockedExchange
GetDriveTypeW
GetFileType
MoveFileW
lstrcmpiW
ReadConsoleInputW
HeapDestroy
GetLastError
HeapReAlloc
GetStartupInfoA
SetHandleCount
InitializeCriticalSection
LeaveCriticalSection
GetTimeZoneInformation
GetSystemDirectoryA
GetCPInfo
GetLocalTime
VirtualAlloc
DeleteCriticalSection
VirtualQuery
GetModuleFileNameA
VirtualFree
FlushFileBuffers
GetEnvironmentStringsW
CopyFileA
GetSystemTime
CreateRemoteThread
CloseHandle
GetCommandLineA
CompareStringA
HeapAlloc
WriteFile
RtlUnwind
SetLastError
ContinueDebugEvent
GetConsoleTitleA
GetModuleHandleA
GetTickCount
GetCurrentThread
GetStringTypeW
GetStringTypeA
FreeEnvironmentStringsA
LocalFileTimeToFileTime
GetCommandLineW
LCMapStringW
HeapCreate
ReadFile
IsBadWritePtr
WideCharToMultiByte
InterlockedIncrement
SetUnhandledExceptionFilter
GetStringTypeExA
GetLongPathNameA
CompareStringW
GetModuleFileNameW
OpenMutexA
GetStartupInfoW
TlsFree
GetVersion
MultiByteToWideChar
SetStdHandle
SetEnvironmentVariableA
HeapFree
UnhandledExceptionFilter
QueryPerformanceCounter
TlsSetValue
GetEnvironmentStrings
TlsAlloc
RemoveDirectoryA
GetStdHandle
GetCurrentProcessId
LockFile
SetFilePointer
TerminateProcess
GetCurrentProcess
InterlockedDecrement
GetCurrentThreadId
CreateDirectoryA
GetProcAddress
CreateMutexA
SetConsoleCtrlHandler
ExitProcess
EnterCriticalSection
FreeEnvironmentStringsW
TlsGetValue
LCMapStringA
LoadLibraryA
GetSystemTimeAsFileTime
wininet
HttpQueryInfoW
GopherCreateLocatorW
UnlockUrlCacheEntryFileA
UpdateUrlCacheContentPath
SetUrlCacheEntryInfoA
InternetSecurityProtocolToStringA
Sections
.text Size: 181KB - Virtual size: 180KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 313KB - Virtual size: 313KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ