Static task
static1
Behavioral task
behavioral1
Sample
bece0b007e6d9b6cc848661c1710f51fb9924612a7c37c006bf84c383c938080.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bece0b007e6d9b6cc848661c1710f51fb9924612a7c37c006bf84c383c938080.exe
Resource
win10v2004-20221111-en
General
-
Target
bece0b007e6d9b6cc848661c1710f51fb9924612a7c37c006bf84c383c938080
-
Size
3.5MB
-
MD5
8c07917a27495cf604247ef470f5ecde
-
SHA1
80fa8cbf76ecd83cc33d73fc3a08ddc98e7f05f9
-
SHA256
bece0b007e6d9b6cc848661c1710f51fb9924612a7c37c006bf84c383c938080
-
SHA512
10e9c1062207d938d2bdb04beec6c12f718136ada70e937ed897eda1d5703f4e66588fc23e0ba16b298bb91b89553aa7709673d551d73350c11dc423d0ba770c
-
SSDEEP
98304:M2hUfKJJ5wA/LBqObhKN6BaBaXastlPfC:MfyJJ5wA/VBoElS
Malware Config
Signatures
Files
-
bece0b007e6d9b6cc848661c1710f51fb9924612a7c37c006bf84c383c938080.exe windows x86
d2fe18e038b19de17721b3515de943c7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathIsRelativeA
PathIsNetworkPathA
SHDeleteKeyA
kernel32
BeginUpdateResourceA
UpdateResourceA
EndUpdateResourceA
CreateDirectoryA
CreateFileA
GetFileAttributesExA
CopyFileA
GetSystemDirectoryA
GetWindowsDirectoryA
OpenProcess
GetCurrentProcess
GetCurrentThread
SetThreadPriority
ResumeThread
lstrlenA
GetModuleFileNameA
GetTempPathA
GetDiskFreeSpaceA
SetPriorityClass
GetVersionExA
MultiByteToWideChar
CreateToolhelp32Snapshot
Process32First
Process32Next
CreateFileW
WriteConsoleW
DecodePointer
FlushFileBuffers
SetFilePointerEx
GetConsoleMode
GetConsoleCP
HeapReAlloc
HeapSize
SetStdHandle
CreateFileMappingA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
IsValidCodePage
FindFirstFileExA
LCMapStringW
GetFileType
GetStringTypeW
HeapAlloc
HeapFree
GetACP
GetStdHandle
GetCurrentDirectoryA
SetCurrentDirectoryA
SetEnvironmentVariableA
ExitProcess
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
CreateThread
EncodePointer
SetLastError
UnmapViewOfFile
MapViewOfFile
SetFilePointer
ReadFile
WriteFile
GetFileSize
MoveFileExA
GetLastError
FindNextFileA
FindFirstFileA
DeleteFileA
GetFileAttributesA
RemoveDirectoryA
CreateProcessA
IsProcessorFeaturePresent
GetModuleHandleA
CloseHandle
FindClose
Sleep
GetExitCodeProcess
TerminateProcess
GetProcAddress
InterlockedDecrement
FindResourceA
SizeofResource
LoadResource
LockResource
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetProcessHeap
RaiseException
LoadLibraryExW
FreeLibrary
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
RtlUnwind
LocalFree
WideCharToMultiByte
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetModuleHandleW
CreateEventW
WaitForSingleObjectEx
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetEvent
ResetEvent
GetCurrentProcessId
user32
DefWindowProcA
RegisterClassA
SystemParametersInfoA
GetWindowThreadProcessId
GetClassNameA
EnumWindows
FindWindowExA
FindWindowA
GetSystemMetrics
DialogBoxParamA
ExitWindowsEx
LoadStringA
LoadIconA
EnumChildWindows
SetClassLongA
MessageBoxA
SetWindowTextA
SetForegroundWindow
EnableWindow
SendDlgItemMessageA
SetDlgItemTextA
EndDialog
CreateDialogParamA
ShowWindow
PostMessageA
PeekMessageA
DispatchMessageA
TranslateMessage
SendMessageA
CreateIconFromResource
DrawFocusRect
InvalidateRect
ReleaseDC
GetDC
GetFocus
SetFocus
GetDlgItemTextA
MoveWindow
DrawIconEx
CreateIconFromResourceEx
LookupIconIdFromDirectoryEx
SetWindowLongA
GetWindowLongA
FillRect
MapWindowPoints
GetClientRect
GetWindowTextA
EndPaint
BeginPaint
DrawTextA
GetDlgItem
DestroyWindow
CreateWindowExA
gdi32
CreateFontA
CreateFontIndirectA
SetTextColor
SetBkMode
SelectObject
GetStockObject
DeleteObject
advapi32
RegEnumKeyExA
DuplicateTokenEx
ImpersonateLoggedOnUser
GetUserNameA
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
RevertToSelf
OpenServiceA
OpenSCManagerA
ControlService
CloseServiceHandle
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegEnumValueA
RegDeleteValueA
RegCreateKeyExA
RegCloseKey
LookupAccountSidW
FreeSid
AllocateAndInitializeSid
shell32
SHGetSpecialFolderLocation
SHChangeNotify
SHGetPathFromIDListA
SHBrowseForFolderA
ord680
SHFileOperationA
ShellExecuteA
SHGetMalloc
ole32
CoInitializeEx
CoInitializeSecurity
CoCreateInstance
CoInitialize
CoUninitialize
oleaut32
VariantClear
VariantInit
SysFreeString
SysAllocString
Sections
.text Size: 130KB - Virtual size: 130KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 276B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ