Static task
static1
Behavioral task
behavioral1
Sample
bc993e817d8e16830268fae04d200f82a6f62cafcf76763019b10b81b4df677e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bc993e817d8e16830268fae04d200f82a6f62cafcf76763019b10b81b4df677e.exe
Resource
win10v2004-20221111-en
General
-
Target
bc993e817d8e16830268fae04d200f82a6f62cafcf76763019b10b81b4df677e
-
Size
248KB
-
MD5
45cf94ce144ce945473a4ca7b2f96daf
-
SHA1
466f451276c1ff9aa70c84f8a498dafe2d069c07
-
SHA256
bc993e817d8e16830268fae04d200f82a6f62cafcf76763019b10b81b4df677e
-
SHA512
d2e8d37afadddbd3b86dd4f837db41409de6e6cc4856e4f1f513989adf82b4bc11d30882e39ca7cd837e321b97f62ecf5274e176c0923df1aef0170cd018b37a
-
SSDEEP
6144:IfiU7LLEe6UL5VFZQChGcx85Q8bRhLm53CzQ7EYDKVP+:Ifp3Ie6ULrHQCcNbRjz+jGV2
Malware Config
Signatures
Files
-
bc993e817d8e16830268fae04d200f82a6f62cafcf76763019b10b81b4df677e.exe windows x86
1ce497459768e85bfabc178f182a88a4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLocaleInfoW
WritePrivateProfileSectionW
EnumResourceNamesW
GetFullPathNameA
SetupComm
CreateMutexW
GetDateFormatA
SetMailslotInfo
ClearCommBreak
GetDriveTypeA
GetBinaryTypeA
GetLogicalDriveStringsA
VirtualProtect
CreateIoCompletionPort
GetVersionExA
GetCommandLineA
GetUserDefaultLangID
SetNamedPipeHandleState
DosDateTimeToFileTime
VirtualAllocEx
QueryDosDeviceW
GetEnvironmentStringsW
GetSystemTimeAdjustment
SetConsoleActiveScreenBuffer
SetProcessWorkingSetSize
SetFileTime
GetFileAttributesExA
lstrcpyA
VirtualAlloc
GenerateConsoleCtrlEvent
TlsGetValue
GetCurrentProcess
GetSystemDefaultLangID
UnhandledExceptionFilter
ExitThread
CreatePipe
SetCommMask
GlobalDeleteAtom
GetConsoleMode
SetLastError
SetVolumeLabelA
ReadFile
CreateDirectoryW
AreFileApisANSI
FreeLibraryAndExitThread
ReleaseMutex
SearchPathW
GetACP
WritePrivateProfileStringA
IsBadStringPtrA
VirtualUnlock
GetConsoleCursorInfo
GetLargestConsoleWindowSize
WriteConsoleOutputCharacterA
SwitchToFiber
LoadLibraryExA
GetThreadContext
SetThreadPriorityBoost
ExitProcess
user32
SetPropW
RemoveMenu
wsprintfA
DestroyWindow
EnumDesktopWindows
CheckDlgButton
MapVirtualKeyA
LoadIconA
GetClipboardFormatNameW
ToUnicode
SendNotifyMessageA
SendDlgItemMessageA
AdjustWindowRect
LoadAcceleratorsW
GetClassInfoW
EnumThreadWindows
DefMDIChildProcW
SetMenuItemInfoW
UnloadKeyboardLayout
SetProcessDefaultLayout
CopyAcceleratorTableW
SetMenuInfo
ShowOwnedPopups
CreateIconFromResource
gdi32
CreateCompatibleBitmap
PtInRegion
SwapBuffers
ScaleViewportExtEx
CloseFigure
comdlg32
GetSaveFileNameA
GetFileTitleA
PageSetupDlgA
advapi32
LookupPrivilegeValueA
CryptGetProvParam
DeregisterEventSource
CryptSetHashParam
GetServiceKeyNameW
RegisterEventSourceA
GetUserNameW
RegQueryValueExW
RegConnectRegistryA
RegGetKeySecurity
NotifyChangeEventLog
SetFileSecurityW
CreateServiceW
ImpersonateSelf
SetSecurityInfo
RegConnectRegistryW
CryptGetKeyParam
GetNamedSecurityInfoW
DestroyPrivateObjectSecurity
RegCloseKey
RegEnumValueW
SetNamedSecurityInfoA
LookupAccountNameA
OpenServiceA
CryptDestroyHash
GetSecurityDescriptorLength
CryptGenKey
InitializeSid
RegDeleteValueA
CryptDeriveKey
CryptSignHashW
RegSaveKeyA
GetSidIdentifierAuthority
CryptExportKey
QueryServiceObjectSecurity
SetNamedSecurityInfoW
shell32
SHGetPathFromIDListA
SHGetDesktopFolder
ole32
OleSetMenuDescriptor
CoCreateInstance
CoReleaseMarshalData
CoRegisterMallocSpy
CoTaskMemRealloc
ReadClassStm
OleRegGetUserType
OleCreateFromData
oleaut32
SafeArrayRedim
QueryPathOfRegTypeLi
SysStringLen
SysAllocStringLen
SafeArrayGetLBound
SafeArrayPutElement
SysFreeString
SafeArrayCreate
shlwapi
PathIsRelativeA
StrCmpNW
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 232KB - Virtual size: 228KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE