Static task
static1
Behavioral task
behavioral1
Sample
bbd9bdad2b203aa4b5196c71ac2060716a9ca946573123810f3d945300291fea.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bbd9bdad2b203aa4b5196c71ac2060716a9ca946573123810f3d945300291fea.exe
Resource
win10v2004-20220901-en
General
-
Target
bbd9bdad2b203aa4b5196c71ac2060716a9ca946573123810f3d945300291fea
-
Size
1.5MB
-
MD5
23c7086b38eea70f55e102e01f01f593
-
SHA1
098cecf6666d81e9bfba8af48cbcb93b69221bd1
-
SHA256
bbd9bdad2b203aa4b5196c71ac2060716a9ca946573123810f3d945300291fea
-
SHA512
40a78fd6997f50c7b4f9df83dc4cc2c7b4f8022e09bbf8d06763fd2eaebe82f237e642a19801c79242db09d7884982426e185e6d16fd96508422b0df4c6e63bd
-
SSDEEP
24576:wf/Q6B8TecjsCvzwK9ep4n54cmkyQvbjQEgFbXqjbKqUcpfFC4PdOrohrbHXI+aM:YQG8T9vw84kyM3gFbypfzOsxjY+Sw
Malware Config
Signatures
Files
-
bbd9bdad2b203aa4b5196c71ac2060716a9ca946573123810f3d945300291fea.exe windows x86
3adb6153147943a5e86c7bc2a7096fb1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
GetPrivateProfileStructA
WritePrivateProfileStructA
GetCurrentProcess
lstrcpyA
SetPriorityClass
GetShortPathNameA
GetSystemTimeAsFileTime
GlobalUnlock
CreateEventA
lstrcmpA
GlobalReAlloc
SetThreadPriority
MultiByteToWideChar
GetDriveTypeA
GetLogicalDrives
GetSystemTime
GetStartupInfoA
GetPrivateProfileStringA
Sleep
CreateThread
WaitForSingleObject
CloseHandle
GetModuleFileNameA
FindResourceA
LoadResource
LockResource
MulDiv
GlobalAlloc
GetFileAttributesA
ExitProcess
CopyFileA
CreateSemaphoreA
GetLastError
ReleaseSemaphore
GetFullPathNameA
FindNextFileA
TerminateThread
MoveFileA
CreateFileA
ReadFile
SetFilePointer
WriteFile
SetEndOfFile
FreeLibrary
lstrcpynA
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
CreateDirectoryA
FindFirstFileA
FindClose
WideCharToMultiByte
CreateProcessA
lstrcmpiA
DeleteFileA
GetTempPathA
GetTempFileNameA
GetPrivateProfileIntA
SetCurrentDirectoryA
GetCurrentDirectoryA
RemoveDirectoryA
SystemTimeToFileTime
GlobalLock
GlobalFree
GetModuleHandleA
user32
LoadCursorA
SetCursor
ClientToScreen
GetUpdateRect
GetCursorPos
EndPaint
GetForegroundWindow
CopyRect
IsWindow
FindWindowA
PostMessageA
SetWindowLongA
SetParent
FindWindowExA
DefWindowProcA
IsChild
CheckMenuItem
SetWindowTextA
ReleaseDC
DestroyWindow
CreateDialogParamA
GetDlgItem
GetWindowRect
ScreenToClient
SetWindowPos
InvalidateRect
SendMessageA
GetDlgItemTextA
DrawTextA
ShowWindow
GetParent
ReleaseCapture
SetCapture
CreateWindowExA
IsWindowVisible
GetWindowLongA
GetClientRect
EnableWindow
LoadImageA
wsprintfA
GetSubMenu
EndDialog
MessageBoxA
GetAsyncKeyState
DispatchMessageA
GetMessageA
GetSystemMetrics
KillTimer
SetFocus
UnregisterClassA
FillRect
EnumDisplaySettingsA
SetRect
SystemParametersInfoA
CharPrevA
DestroyIcon
DestroyCursor
BeginDeferWindowPos
DeferWindowPos
EndDeferWindowPos
SetWindowRgn
wvsprintfA
CheckRadioButton
GetDlgItemInt
DrawIconEx
SetTimer
WindowFromPoint
RegisterClipboardFormatA
SetClassLongA
DialogBoxParamA
LoadBitmapA
IsDlgButtonChecked
DestroyMenu
PostQuitMessage
UpdateWindow
LoadMenuA
GetSystemMenu
InsertMenuA
GetMenuItemInfoA
InsertMenuItemA
LoadIconA
RegisterClassA
GetClassInfoA
RegisterWindowMessageA
LoadStringA
LoadAcceleratorsA
RemoveMenu
GetClassLongA
IsDialogMessageA
TranslateMessage
CharNextA
CallWindowProcA
SendDlgItemMessageA
PeekMessageA
SetDlgItemTextA
GetDC
GetWindowTextA
RegisterClassExA
CheckDlgButton
SetCursorPos
gdi32
DeleteDC
GetDIBits
SelectObject
CreateCompatibleDC
SetBkMode
SetTextColor
LineTo
MoveToEx
UpdateColors
SelectPalette
BitBlt
CreateDIBSection
CreatePalette
GetDeviceCaps
CreateBrushIndirect
GetNearestColor
GetPixel
GetTextMetricsA
CreateFontA
CreateCompatibleBitmap
StretchBlt
ExtSelectClipRgn
Rectangle
IntersectClipRect
SetBkColor
GetStockObject
CreatePen
TextOutA
CreateRectRgn
CreatePolyPolygonRgn
GetTextExtentPoint32A
CreateSolidBrush
GetObjectA
RoundRect
GetBkColor
GetTextColor
DeleteObject
GetDIBColorTable
advapi32
RegCreateKeyA
RegCloseKey
RegQueryValueExA
RegOpenKeyA
RegDeleteValueA
RegSetValueExA
RegDeleteKeyA
RegEnumKeyA
RegEnumKeyExA
RegOpenKeyExA
shell32
ShellExecuteA
SHGetMalloc
DragQueryPoint
DragQueryFileA
DragFinish
SHBrowseForFolderA
SHGetPathFromIDListA
Shell_NotifyIconA
comctl32
ord17
ole32
CoCreateGuid
CoRevokeClassObject
RevokeDragDrop
OleUninitialize
OleInitialize
RegisterDragDrop
CoRegisterClassObject
CoInitialize
CLSIDFromString
CoCreateInstance
comdlg32
GetSaveFileNameA
GetOpenFileNameA
msvcrt
_XcptFilter
_onexit
__dllonexit
__CxxFrameHandler
_purecall
free
strtol
fwrite
qsort
__mb_cur_max
_isctype
_pctype
mbstowcs
wcstombs
??2@YAPAXI@Z
srand
sprintf
toupper
fseek
ftell
realloc
fputc
memset
_exit
exit
memcmp
fgets
atoi
??3@YAXPAX@Z
strncpy
strcmp
strncmp
fprintf
sqrt
sin
pow
strcat
fopen
fread
fclose
strcpy
_mbsstr
memcpy
_CIpow
rand
_ftol
_acmdln
__getmainargs
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_stricmp
_controlfp
_strnicmp
_strdup
Sections
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
DATA Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
CODE Size: 1KB - Virtual size: 2.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE