Static task
static1
Behavioral task
behavioral1
Sample
ba97c687ea04b2610eca79aaf51dffd97619fd2bade19252192e3a32be31c8c9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ba97c687ea04b2610eca79aaf51dffd97619fd2bade19252192e3a32be31c8c9.exe
Resource
win10v2004-20220901-en
General
-
Target
ba97c687ea04b2610eca79aaf51dffd97619fd2bade19252192e3a32be31c8c9
-
Size
171KB
-
MD5
d278923325547f95edb7a0b4ac99ddc2
-
SHA1
7a803071679f256424e0788b7689dc3bf188e5aa
-
SHA256
ba97c687ea04b2610eca79aaf51dffd97619fd2bade19252192e3a32be31c8c9
-
SHA512
e92dfb34654988f8de7a488169a1ba86df1cf30386a387563ade06035166bc175ad7eef8d67a88babef448c7732b8da6a3f72d34d3389ffd9d78b3df836d3710
-
SSDEEP
3072:KqvIswhExzShCkEs9W/ZrPpBrDa1oOjKNqviR2Mj32P5pmvFq:KqvIswhExzShCO9W/ZrRByrjbKR2M72f
Malware Config
Signatures
Files
-
ba97c687ea04b2610eca79aaf51dffd97619fd2bade19252192e3a32be31c8c9.exe windows x86
a58416a8b152407afba5dbeb20aad3fd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcess
MoveFileExA
_lread
WideCharToMultiByte
CloseHandle
TerminateProcess
WaitForSingleObject
OpenProcess
Module32First
CreateToolhelp32Snapshot
Process32Next
GetCurrentProcessId
Process32First
FreeLibrary
GlobalUnlock
GlobalLock
GetProcessHeap
SetEndOfFile
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
CreateFileA
FlushFileBuffers
GetConsoleMode
SetPriorityClass
SetStdHandle
InitializeCriticalSectionAndSpinCount
LoadLibraryA
HeapReAlloc
VirtualAlloc
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetTickCount
QueryPerformanceCounter
VirtualFree
HeapCreate
DeleteCriticalSection
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStdHandle
WriteFile
GetModuleFileNameA
SetFileAttributesA
CopyFileA
DeleteFileA
GetLocalTime
_lcreat
_lopen
lstrlenA
_llseek
_lwrite
_lclose
GetSystemTime
GetDateFormatA
GetTimeFormatA
GetConsoleCP
Sleep
ReadFile
MultiByteToWideChar
SetFilePointer
LeaveCriticalSection
EnterCriticalSection
ExitProcess
HeapSize
HeapAlloc
HeapFree
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
InterlockedDecrement
GetLastError
GetCurrentThreadId
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
GetSystemTimeAsFileTime
GetCommandLineA
GetStartupInfoA
GetModuleHandleW
GetProcAddress
TlsGetValue
user32
TranslateAcceleratorA
GetMessageA
LoadAcceleratorsA
wsprintfA
TranslateMessage
DispatchMessageA
SetWindowsHookExA
UnhookWindowsHookEx
KillTimer
EnumDisplayDevicesA
ShowWindow
CreateWindowExA
GetSystemMetrics
ShowCursor
keybd_event
SetTimer
ExitWindowsEx
GetForegroundWindow
GetWindowTextA
GetKeyState
CallNextHookEx
SetClipboardViewer
OpenClipboard
GetClipboardData
CloseClipboard
MessageBoxA
DestroyWindow
RegisterClassExA
ChangeClipboardChain
UpdateWindow
GetDC
EnumWindows
GetWindowThreadProcessId
PostMessageA
SendMessageA
PostQuitMessage
BeginPaint
EndPaint
DefWindowProcA
LoadIconA
LoadCursorA
GetKeyboardState
gdi32
SelectObject
SetTextColor
SetBkColor
DeleteObject
CreateSolidBrush
TextOutA
CreateFontA
advapi32
LookupPrivilegeValueA
AdjustTokenPrivileges
RegDeleteValueA
RegSetValueExA
RegOpenKeyA
RegQueryValueExA
OpenProcessToken
shell32
SHGetFolderPathA
ShellExecuteA
ole32
CoUninitialize
ws2_32
WSACleanup
WSAStartup
closesocket
connect
getservbyname
htons
socket
gethostbyaddr
inet_addr
gethostbyname
recv
send
gethostname
shlwapi
PathAppendA
urlmon
URLDownloadToFileA
Sections
.text Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 45KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ