Static task
static1
Behavioral task
behavioral1
Sample
bde61e681c12a2a2359ce6e8bcac5249eecd2ceb39c515aed2c593fa8d7114d0.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
bde61e681c12a2a2359ce6e8bcac5249eecd2ceb39c515aed2c593fa8d7114d0.exe
Resource
win10v2004-20220901-en
General
-
Target
bde61e681c12a2a2359ce6e8bcac5249eecd2ceb39c515aed2c593fa8d7114d0
-
Size
769KB
-
MD5
65f10452a01729bc8c94b8e586843946
-
SHA1
6783cc14329bf984aee58fe26b41ac568fe90ff7
-
SHA256
bde61e681c12a2a2359ce6e8bcac5249eecd2ceb39c515aed2c593fa8d7114d0
-
SHA512
29b73f4c0fedd11cd72921a0b173296b5bbc7ed5be0166e6d82dfe24ef39b2fb6c6379c0a72d6b5746cb25c0cfcc4808fb9aa16893a278f38faeba4b543f1d36
-
SSDEEP
24576:COjlUOLZ8Qnq4NedttG3qQbvccgPMgHQp:NlUE8QqNtGboK
Malware Config
Signatures
Files
-
bde61e681c12a2a2359ce6e8bcac5249eecd2ceb39c515aed2c593fa8d7114d0.exe windows x86
90f27962374418f6722668a349a8c432
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapReAlloc
HeapFree
HeapAlloc
GetProcessHeap
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
GetCommandLineW
InitializeCriticalSectionAndSpinCount
RaiseException
GetLastError
DecodePointer
DeleteCriticalSection
FreeLibrary
GetProcAddress
LoadLibraryW
WideCharToMultiByte
MoveFileExW
CreateFileW
GetFileSize
ReadFile
SetEndOfFile
SetFilePointer
SetFileTime
WriteFile
CloseHandle
GetStdHandle
GetFileInformationByHandle
GetCurrentDirectoryW
DeleteFileW
SetFileAttributesW
GetTempPathW
HeapSize
GetCurrentProcessId
GetCurrentThreadId
FindClose
FindFirstFileW
GetModuleHandleA
VirtualAlloc
VirtualFree
GetModuleFileNameW
GetCurrentProcess
GetTempFileNameW
QueryDosDeviceW
CreateToolhelp32Snapshot
Process32FirstW
OpenProcess
TerminateProcess
Process32NextW
IsDebuggerPresent
OutputDebugStringW
EnterCriticalSection
LeaveCriticalSection
ReadConsoleW
SetEnvironmentVariableA
FlushFileBuffers
HeapDestroy
GetModuleHandleW
GetTickCount
CreateDirectoryW
lstrcpynW
SetLastError
GetFileAttributesW
WriteConsoleW
SetStdHandle
GetDriveTypeW
SetFilePointerEx
LoadLibraryExW
GetConsoleMode
GetConsoleCP
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetFileType
GetModuleHandleExW
ExitProcess
GetOEMCP
GetACP
IsValidCodePage
EncodePointer
MultiByteToWideChar
GetStringTypeW
RtlUnwind
IsProcessorFeaturePresent
GetSystemTimeAsFileTime
GetTimeZoneInformation
GetFullPathNameW
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
Sleep
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
CompareStringW
LCMapStringW
user32
CharUpperW
advapi32
RegQueryValueExW
RegOpenKeyExW
RegSetValueExW
RegCreateKeyExW
RegCloseKey
ole32
CoInitializeEx
CoUninitialize
CoCreateInstance
shell32
SHFileOperationW
CommandLineToArgvW
SHGetSpecialFolderPathW
oleaut32
SysAllocStringLen
SysAllocString
SysStringLen
SysFreeString
shlwapi
PathFileExistsW
PathIsDirectoryW
PathAddBackslashW
Sections
.text Size: 122KB - Virtual size: 121KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 591KB - Virtual size: 591KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ