Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Variant.Babar.140367.12601.12375.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Variant.Babar.140367.12601.12375.exe
Resource
win10v2004-20220901-en
General
-
Target
SecuriteInfo.com.Variant.Babar.140367.12601.12375.exe
-
Size
52KB
-
MD5
d13ae27bc05d5fb48059184a5463f666
-
SHA1
d012d856e5397d30c60371dda76ce49e15844b7b
-
SHA256
bacbb64886c275235eef4c1584708a125c802de68ac910edc497e1935728c190
-
SHA512
7df8b149d02fa440ddc6d46a011d6664dc266fa7fd817aaf450254d0e3c66c83f44d106777488085cc0fadd56382ad039180736d21b68faf07e92587adad3f26
-
SSDEEP
768:IRWmhROsYQpVtiss8m344AAPTPLfrRs7KfB3lU9bYBhEY245fduvNKSWB3cS:IRWQYQ5a8l4AAfj0Y3ZByXS
Malware Config
Signatures
Files
-
SecuriteInfo.com.Variant.Babar.140367.12601.12375.exe.exe windows x86
5ab08c1577a3281442eef2d1de02fd82
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ord17
shlwapi
SHRegQueryUSValueW
PathCommonPrefixW
PathRemoveFileSpecA
UrlIsA
PathBuildRootW
PathStripPathA
kernel32
HeapSize
CloseHandle
CreateFileW
GetStringTypeW
GetConsoleCP
WideCharToMultiByte
FlushFileBuffers
SetStdHandle
LoadLibraryW
OutputDebugStringW
GetCPInfo
GetOEMCP
GetACP
GetModuleHandleW
IsWow64Process
GetCommandLineW
Wow64RevertWow64FsRedirection
Wow64DisableWow64FsRedirection
VirtualAlloc
GetTickCount
CreateProcessW
GetExitCodeProcess
ExitProcess
GetCurrentProcess
Sleep
IsValidCodePage
LoadLibraryExW
TerminateProcess
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
SetUnhandledExceptionFilter
UnhandledExceptionFilter
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetTickCount64
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetCurrentThreadId
InterlockedIncrement
SetLastError
RtlUnwind
GetStartupInfoW
InitOnceExecuteOnce
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
SetEndOfFile
GetFileType
SetFilePointerEx
LCMapStringEx
WriteConsoleW
WaitForSingleObject
GetLastError
HeapFree
HeapAlloc
HeapReAlloc
ReadFile
IsProcessorFeaturePresent
GetProcessHeap
EncodePointer
DecodePointer
InterlockedDecrement
GetModuleHandleExW
GetProcAddress
MultiByteToWideChar
GetStdHandle
WriteFile
GetModuleFileNameW
IsDebuggerPresent
EnterCriticalSection
LeaveCriticalSection
GetConsoleMode
ReadConsoleW
SetFilePointer
wsnmp32
ord606
ord504
ord400
ord500
rtutils
LogEventW
LogErrorW
TracePrintfW
TraceDeregisterExA
TracePrintfExA
TraceRegisterExA
RouterAssert
crypt32
CertOpenSystemStoreW
CertNameToStrW
CertRemoveEnhancedKeyUsageIdentifier
CryptMsgGetParam
CryptMsgCountersignEncoded
gdi32
SetFontEnumeration
ArcTo
AbortPath
GetDeviceCaps
GetFontUnicodeRanges
GetTextAlign
GdiPlayPrivatePageEMF
SetDeviceGammaRamp
ExtEscape
setupapi
SetupDuplicateDiskSpaceListW
SetupSetDirectoryIdW
SetupDiCreateDeviceInfoListExW
SetupCancelTemporarySourceList
user32
PostMessageW
TranslateMessage
GetMessageW
LoadStringW
LoadAcceleratorsW
TranslateAcceleratorW
DestroyMenu
GetParent
DispatchMessageW
Sections
.text Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ