Static task
static1
Behavioral task
behavioral1
Sample
be52c3ce400bc93e5a1b462b29b9047b6f3f35f947f8fe5e546fd769c192a903.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
be52c3ce400bc93e5a1b462b29b9047b6f3f35f947f8fe5e546fd769c192a903.exe
Resource
win10v2004-20220812-en
General
-
Target
be52c3ce400bc93e5a1b462b29b9047b6f3f35f947f8fe5e546fd769c192a903
-
Size
5.2MB
-
MD5
bf4c7f61d1a242e29553475e08809101
-
SHA1
7143f02887f457bf546c57b43f80f5667e875b12
-
SHA256
be52c3ce400bc93e5a1b462b29b9047b6f3f35f947f8fe5e546fd769c192a903
-
SHA512
ee24461ba7eab382c5735fe387fcdc51b007f169c52e03a616831f70931f606450be6e84f7a5f084edb5b6064d914cbca81f3826d3e88076248d60ebc2d047b7
-
SSDEEP
98304:H6OXYmhoM9rBFO/bfpoVhLBYiyuA3Pvk50eL4az221+ttWSxUT8:aqYaXNB0SVhLn5mp2IWSqT8
Malware Config
Signatures
Files
-
be52c3ce400bc93e5a1b462b29b9047b6f3f35f947f8fe5e546fd769c192a903.exe windows x86
078e11b4e20932b327a6594c1df754ff
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcessHeap
GetProcAddress
LoadLibraryA
GetLastError
GetCurrentProcess
TerminateProcess
DeleteFileA
CreateDirectoryA
GetTempPathA
GetModuleFileNameA
MoveFileA
WaitForSingleObject
CreateProcessA
ResumeThread
ResetEvent
CreateEventA
SetEvent
Sleep
GetShortPathNameA
WriteFile
CreateFileA
GetCurrentDirectoryA
VirtualAlloc
VirtualFree
HeapAlloc
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
CompareStringW
CompareStringA
SetEndOfFile
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
InitializeCriticalSectionAndSpinCount
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
OpenProcess
HeapFree
CloseHandle
FreeLibrary
EnterCriticalSection
GetVersionExA
SetStdHandle
HeapReAlloc
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
HeapCreate
GetEnvironmentStringsW
FreeEnvironmentStringsW
CopyFileA
GetFileSize
SetFilePointer
ReadFile
MoveFileExA
FlushFileBuffers
FileTimeToSystemTime
GetFileInformationByHandle
GetFileType
GetCurrentThreadId
ExitThread
CreateThread
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
RtlUnwind
GetCommandLineA
GetStartupInfoA
FileTimeToLocalFileTime
PeekNamedPipe
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
MultiByteToWideChar
GetTimeZoneInformation
SetHandleCount
GetStdHandle
GetModuleHandleA
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
ExitProcess
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringA
LCMapStringW
HeapSize
FreeEnvironmentStringsA
GetEnvironmentStrings
SetEnvironmentVariableA
user32
FindWindowA
GetWindowRect
GetSystemMetrics
DialogBoxParamA
PostQuitMessage
LoadIconA
SetDlgItemTextA
DefWindowProcA
MessageBoxA
InvalidateRect
GetSystemMenu
EnableMenuItem
GetDlgItem
EnableWindow
SendMessageA
SendDlgItemMessageA
MoveWindow
gdi32
SetTextColor
shell32
SHBrowseForFolderA
SHGetPathFromIDListA
shlwapi
PathFileExistsA
PathFindFileNameA
PathAppendA
PathRemoveBackslashA
PathRemoveBlanksA
PathRemoveFileSpecA
PathFindExtensionA
Sections
.text Size: 169KB - Virtual size: 168KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ