Static task
static1
Behavioral task
behavioral1
Sample
bad4653cd4094b595d0c478db22517c59f84d082373a30cfb85f8fb51dbc7336.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bad4653cd4094b595d0c478db22517c59f84d082373a30cfb85f8fb51dbc7336.exe
Resource
win10v2004-20221111-en
General
-
Target
bad4653cd4094b595d0c478db22517c59f84d082373a30cfb85f8fb51dbc7336
-
Size
731KB
-
MD5
0a6eadf7aed8cb324c408ddbe2280585
-
SHA1
b232ec1ffca063bcf5ed10d770d5f95314c138ae
-
SHA256
bad4653cd4094b595d0c478db22517c59f84d082373a30cfb85f8fb51dbc7336
-
SHA512
56df451d2bb3db320cc6f329b9882cd92b62126c8690d8a0d7469a15171f01bc3d56cdad16488c6ab894e7ed6bab30aa55119c7f434b4f869d72d88b0aded453
-
SSDEEP
12288:t7joyzUEjZ3z7jfABoJ01pkmezvbNnM1GAjP5YnXERtQjuiLW++Y0ttY5trkIdgK:ygHZ3zvftzzRnM1zPiq++zyD44Uu
Malware Config
Signatures
Files
-
bad4653cd4094b595d0c478db22517c59f84d082373a30cfb85f8fb51dbc7336.exe windows x86
df932cbe97e163ac3fe74be565113671
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
cryptopp32
?AESEncrypt@@YA_NPBEH00PAEH@Z
?AESDecrypt@@YA_NPBEH00PAEH@Z
kernel32
GetVersionExW
CreateFileA
CloseHandle
OutputDebugStringW
GetModuleHandleA
SizeofResource
LockResource
FindResourceExW
LoadResource
FindResourceW
GetCurrencyFormatW
FindClose
MultiByteToWideChar
DeleteFileW
WideCharToMultiByte
GetConsoleTitleW
Sleep
GetCurrentThreadId
CreateThread
CreateFileW
WriteFile
GlobalAlloc
GlobalFree
GetModuleHandleW
LoadLibraryW
GetProcAddress
FreeLibrary
GetModuleFileNameW
TerminateProcess
GetCurrentProcess
GetConsoleWindow
SetEndOfFile
WriteConsoleW
SetStdHandle
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
FindNextFileA
FindFirstFileExA
GetOEMCP
IsValidCodePage
GetFileAttributesExW
CreateProcessA
GetExitCodeProcess
SetFilePointerEx
ReadConsoleW
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetTimeZoneInformation
DeviceIoControl
GetUserDefaultLCID
GetProcessHeap
DeleteCriticalSection
HeapDestroy
DecodePointer
HeapAlloc
RaiseException
HeapReAlloc
GetLastError
HeapSize
InitializeCriticalSectionAndSpinCount
lstrlenW
HeapFree
IsValidLocale
GetFileType
GetCommandLineW
GetCommandLineA
GetStdHandle
ExitProcess
GetModuleHandleExW
ExitThread
GetACP
ReadFile
RtlUnwind
WaitForSingleObject
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
ReleaseSemaphore
VirtualFree
VirtualProtect
VirtualAlloc
LoadLibraryExW
FreeLibraryAndExitThread
GetThreadTimes
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
SignalObjectAndWait
CreateTimerQueue
InitializeSListHead
GetCurrentProcessId
GetStartupInfoW
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
ResetEvent
SetEvent
IsDebuggerPresent
GetCPInfo
GetStringTypeW
GetLocaleInfoW
LCMapStringW
CompareStringW
QueryPerformanceCounter
EncodePointer
GetTickCount
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
GetModuleFileNameA
EnumSystemLocalesW
DuplicateHandle
WaitForSingleObjectEx
SwitchToThread
GetCurrentThread
EnterCriticalSection
LeaveCriticalSection
TryEnterCriticalSection
SetLastError
CreateEventW
TlsAlloc
TlsGetValue
user32
SetTimer
PeekMessageW
DispatchMessageW
FindWindowW
GetSystemMenu
RemoveMenu
SetWindowPos
SetWindowLongA
UpdateWindow
DefWindowProcW
wvsprintfW
SetFocus
ShowWindow
CreateWindowExA
PostThreadMessageW
IsWindowVisible
DestroyMenu
TrackPopupMenu
SetForegroundWindow
InsertMenuW
GetCursorPos
ReleaseDC
CreatePopupMenu
advapi32
LookupPrivilegeValueW
RegCreateKeyW
RegOpenKeyExW
RegSetValueExW
RegDeleteValueW
RegGetValueW
AdjustTokenPrivileges
RegQueryValueExW
OpenProcessToken
RegCloseKey
shell32
Shell_NotifyIconW
ole32
CoCreateInstance
StringFromGUID2
CoUninitialize
CLSIDFromProgID
CoInitializeEx
CoTaskMemFree
oleaut32
SysAllocString
VariantInit
VariantClear
GetErrorInfo
odbc32
ord24
ord75
ord107
ord31
ord9
ord111
ord16
ord4
ord13
ord136
gdiplus
GdiplusShutdown
GdipCreateHICONFromBitmap
GdipCreateBitmapFromFile
GdipLoadImageFromFile
GdipCreateStringFormat
GdiplusStartup
GdipDeleteFontFamily
GdipGetImageHeight
GdipGetImageEncoders
GdipSaveImageToFile
GdipDrawLineI
GdipSetStringFormatAlign
GdipDeletePen
GdipGetImageWidth
GdipDeleteFont
GdipCloneBrush
GdipDeleteStringFormat
GdipDeleteGraphics
GdipGetImageEncodersSize
GdipCreatePen2
GdipGetImageGraphicsContext
GdipDrawString
GdipFree
GdipGetGenericFontFamilySansSerif
GdipSetSolidFillColor
GdipDrawLine
GdipCreateSolidFill
GdipCreateFont
GdipDisposeImage
GdipAlloc
GdipDeleteBrush
GdipCloneImage
GdipCreateFontFamilyFromName
iphlpapi
GetAdaptersInfo
Sections
.text Size: 456KB - Virtual size: 455KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 114KB - Virtual size: 114KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 124KB - Virtual size: 123KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ