Static task
static1
Behavioral task
behavioral1
Sample
bd774d3339c812f844b6a4d155b8cf063bdf5fd48caa730cf86cc51e6ea918be.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
bd774d3339c812f844b6a4d155b8cf063bdf5fd48caa730cf86cc51e6ea918be.exe
Resource
win10v2004-20230221-en
General
-
Target
bd774d3339c812f844b6a4d155b8cf063bdf5fd48caa730cf86cc51e6ea918be
-
Size
4.1MB
-
MD5
50d3ad9aa934b96ab7d9ad28d9b40685
-
SHA1
58fdf68656b6febd5e03c8c7e3e29e0e72e5a417
-
SHA256
bd774d3339c812f844b6a4d155b8cf063bdf5fd48caa730cf86cc51e6ea918be
-
SHA512
7c79fb8b940eefc192532e802afaee23b5ca22c90d14e4d0161833376e034dc2a053e00d922260327c48ecbb192b2e6e3c948ee159994148a7ae47d3f5e5927e
-
SSDEEP
49152:aout7WNwz7kGwZr5zQA1v/Rhrb1Snqx9ew1bCPqhbS5Zzfm25:att6Nc7kGwZVDv/brb1Svgebzus
Malware Config
Signatures
Files
-
bd774d3339c812f844b6a4d155b8cf063bdf5fd48caa730cf86cc51e6ea918be.exe windows x86
2c245db2aa67caf14966ccc0de9e4072
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
wininet
InternetOpenW
InternetOpenUrlW
InternetReadFile
HttpQueryInfoW
InternetGetLastResponseInfoW
InternetCloseHandle
advapi32
RegQueryValueW
GetKernelObjectSecurity
LookupPrivilegeValueA
RegDeleteValueA
RegOpenKeyExA
RegQueryValueExA
RegOpenKeyW
GetSecurityInfo
RegSetValueExA
GetSidIdentifierAuthority
CryptGenRandom
IsTextUnicode
CreateServiceW
CloseServiceHandle
DeleteService
OpenSCManagerW
OpenServiceW
RegEnumKeyW
StartServiceW
QueryServiceStatus
ChangeServiceConfigW
RegOpenKeyExW
RegCloseKey
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
RegQueryInfoKeyW
RegEnumValueW
ConvertSidToStringSidW
RegCreateKeyExW
RegQueryValueExW
RegSetValueExW
CryptSetHashParam
CryptGetHashParam
CryptAcquireContextW
CryptReleaseContext
CryptImportKey
CryptCreateHash
CryptDestroyKey
CryptDestroyHash
CryptHashData
RegDeleteKeyW
RegDeleteValueW
RegEnumKeyExW
GetSidSubAuthority
GetUserNameW
RegCreateKeyW
GetTokenInformation
EqualSid
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
SetNamedSecurityInfoW
AllocateAndInitializeSid
SetSecurityDescriptorOwner
SetEntriesInAclW
FreeSid
RegSetKeySecurity
GetLengthSid
EnumDependentServicesW
QueryServiceStatusEx
ControlService
RegSaveKeyExW
ConvertStringSecurityDescriptorToSecurityDescriptorW
SetSecurityInfo
GetSecurityDescriptorSacl
oleaut32
SysAllocStringLen
SysReAllocStringLen
SystemTimeToVariantTime
VariantTimeToSystemTime
OleLoadPicture
OleCreatePictureIndirect
SafeArrayUnaccessData
VariantInit
SafeArrayAccessData
SysFreeString
SysAllocString
VariantClear
VariantChangeType
ole32
CoTaskMemFree
CoCreateGuid
StringFromCLSID
CoInitializeEx
GetHGlobalFromStream
CreateStreamOnHGlobal
CoInitialize
CoUninitialize
CoTaskMemAlloc
CoCreateInstance
activeds
ord3
ord7
kernel32
RemoveDirectoryW
DeleteFileW
MultiByteToWideChar
CreateProcessW
GetTickCount
GetVersionExW
GetExitCodeProcess
LocalFree
GlobalLock
GlobalUnlock
GlobalFree
GetCurrentProcessId
CreateThread
ConnectNamedPipe
CreateNamedPipeW
ReadFile
DisconnectNamedPipe
lstrcpyW
LocalAlloc
CreateMutexW
SystemTimeToFileTime
FileTimeToSystemTime
ReleaseMutex
FileTimeToLocalFileTime
GetSystemTime
OutputDebugStringW
GetEnvironmentVariableW
SleepEx
SetCurrentDirectoryW
EnumResourceNamesW
GetFileSize
LoadLibraryExW
MoveFileW
WaitForSingleObjectEx
OpenMutexW
BeginUpdateResourceW
GetCurrentThreadId
GlobalAlloc
MulDiv
ResumeThread
FreeResource
GetCommandLineW
GetProcessIoCounters
GetComputerNameW
GetStdHandle
GetVersion
CompareFileTime
FindFirstFileExW
GetSystemTimeAsFileTime
OpenEventW
GetSystemDirectoryW
GetWindowsDirectoryW
GetLongPathNameW
MapViewOfFile
UnmapViewOfFile
FormatMessageA
WaitNamedPipeW
FormatMessageW
GetModuleFileNameW
FlushFileBuffers
GetTempPathW
GetLocalTime
GetSystemInfo
SetNamedPipeHandleState
UpdateResourceW
EnumResourceLanguagesW
HeapAlloc
HeapFree
GetProcessHeap
TlsGetValue
ProcessIdToSessionId
GetFileSizeEx
FlushViewOfFile
OpenFileMappingW
GetLogicalDrives
QueryDosDeviceW
FindResourceExW
GetFileInformationByHandle
VirtualProtect
LocalUnlock
GetPrivateProfileStringW
WritePrivateProfileStringW
LocalLock
VirtualFree
VirtualAlloc
GetThreadLocale
GetStartupInfoA
GetLocaleInfoA
GetCommandLineA
UnhandledExceptionFilter
RtlUnwind
RaiseException
TlsSetValue
TlsFree
TlsAlloc
lstrlenW
lstrlenA
lstrcpyA
lstrcmpA
lstrcatW
WaitForMultipleObjects
VirtualQuery
TerminateThread
ReleaseSemaphore
LoadLibraryExA
LoadLibraryA
GetThreadContext
GetModuleHandleA
GetModuleFileNameA
GetExitCodeThread
GetCurrentDirectoryW
ExitThread
DuplicateHandle
DeviceIoControl
CreateSemaphoreA
CreateProcessA
CreatePipe
CreateMutexA
CreateFileMappingA
CreateFileA
CreateEventA
GetVersionExA
lstrcmpW
CompareStringW
GlobalDeleteAtom
GlobalFindAtomW
GlobalAddAtomW
InterlockedExchange
CompareStringA
GetLocaleInfoW
ConvertDefaultLocale
GlobalFlags
GlobalReAlloc
GlobalHandle
LocalReAlloc
SetErrorMode
GetStartupInfoW
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapReAlloc
HeapSize
SetHandleCount
GetFileType
HeapCreate
QueryPerformanceCounter
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringW
GetTimeZoneInformation
GetTimeFormatA
GetDateFormatA
LCMapStringA
GetConsoleCP
GetConsoleMode
InitializeCriticalSectionAndSpinCount
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
CopyFileW
WriteFile
SetFileAttributesW
FindNextFileW
FreeEnvironmentStringsW
CreateFileMappingW
FindClose
SetFileTime
CreateDirectoryW
GetEnvironmentStringsW
SetEnvironmentVariableW
SetEndOfFile
GetDriveTypeW
SetFilePointer
FindFirstFileW
ExitProcess
Sleep
IsWow64Process
TerminateProcess
OpenProcess
WriteProcessMemory
VirtualProtectEx
ReadProcessMemory
WideCharToMultiByte
DeleteCriticalSection
EnterCriticalSection
SetLastError
SetThreadPriority
CreateFileW
GetFileAttributesW
LeaveCriticalSection
InitializeCriticalSection
GetCurrentThread
CloseHandle
CreateEventW
ResetEvent
GetProcAddress
LoadLibraryW
GetModuleHandleW
SetEvent
WaitForSingleObject
InterlockedDecrement
InterlockedIncrement
FreeLibrary
ExpandEnvironmentStringsW
LockResource
GetLastError
SizeofResource
GetCurrentProcess
LoadResource
FindResourceW
EndUpdateResourceW
user32
ScreenToClient
EndDialog
UnhookWindowsHookEx
GetMenuItemCount
GetWindowPlacement
IsIconic
SystemParametersInfoA
GetMenu
CallWindowProcW
PtInRect
GetClassInfoW
SetMenu
GetKeyState
MapWindowPoints
GetMessagePos
GetMessageTime
GetForegroundWindow
RemovePropW
GetPropW
SetPropW
GetClassLongW
CallNextHookEx
SetWindowsHookExW
GetCapture
SendDlgItemMessageA
SendDlgItemMessageW
ValidateRect
GetSysColorBrush
UnregisterClassW
GrayStringW
GetWindowTextW
SetWindowTextW
PostQuitMessage
LoadCursorW
RegisterClassExW
LoadIconW
GetDesktopWindow
ShowWindow
MoveWindow
SetTimer
WaitMessage
SystemParametersInfoW
GetNextDlgTabItem
ClientToScreen
SetCursor
FillRect
LoadImageW
GetSubMenu
WindowFromPoint
GetDC
DrawFocusRect
InflateRect
OffsetRect
TrackPopupMenuEx
LoadMenuW
GetWindowLongW
ReleaseDC
DrawStateW
DestroyCursor
GetSysColor
FrameRect
GetActiveWindow
DestroyMenu
DestroyIcon
CopyRect
wvsprintfW
GetWindowRect
GetParent
InvalidateRect
UpdateWindow
FindWindowW
SendMessageW
DestroyWindow
GetMessageW
PostMessageW
MsgWaitForMultipleObjects
MessageBeep
TranslateMessage
PeekMessageW
IsWindow
CreateWindowExW
RegisterClassW
DefWindowProcW
DispatchMessageW
MessageBoxW
GetClientRect
LoadBitmapW
EnableWindow
DrawTextExW
TabbedTextOutW
IsWindowEnabled
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
ModifyMenuW
GetMenuState
CheckMenuItem
CloseDesktop
DispatchMessageA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
PeekMessageA
CloseClipboard
GetSystemMenu
DrawTextW
GetLastActivePopup
DrawIcon
IsDialogMessageW
CreateDialogIndirectParamW
GetAsyncKeyState
EnableMenuItem
EmptyClipboard
GetDlgItem
LoadStringW
CheckDlgButton
OpenClipboard
GetSystemMetrics
SetClipboardData
WinHelpW
GetDialogBaseUnits
EndPaint
BeginPaint
AdjustWindowRectEx
MessageBoxA
GetTopWindow
SetActiveWindow
TrackPopupMenu
RegisterWindowMessageW
GetMenuItemID
RedrawWindow
SetMenuDefaultItem
EnumWindows
AppendMenuW
GetCursorPos
CreatePopupMenu
SendMessageTimeoutW
RemoveMenu
GetWindowThreadProcessId
SetRectEmpty
SetRect
GetClassNameW
IsWindowVisible
GetDlgCtrlID
GetWindow
KillTimer
SetWindowLongW
SetWindowPos
SetForegroundWindow
GetWindowTextLengthW
GetFocus
SetFocus
GetClassInfoExW
gdi32
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
GetObjectW
StretchBlt
BitBlt
GetStockObject
GetPixel
CreateCompatibleBitmap
SelectObject
DeleteObject
CreateBitmap
SetPixel
SetBkColor
DeleteDC
SetTextColor
CreateSolidBrush
CreatePen
CreatePatternBrush
CreateRectRgn
CreateFontW
FillRgn
Rectangle
PatBlt
CreateFontIndirectW
GetTextExtentPoint32W
GetDeviceCaps
GetTextMetricsA
GetTextExtentPointA
CreateDCW
SaveDC
RestoreDC
SetBkMode
SetMapMode
GetClipBox
LineTo
MoveToEx
PtVisible
RectVisible
TextOutW
ExtTextOutW
Escape
CreateCompatibleDC
winspool.drv
DocumentPropertiesW
OpenPrinterW
ClosePrinter
shell32
SHChangeNotify
ShellExecuteW
CommandLineToArgvW
Shell_NotifyIconW
ExtractAssociatedIconW
ShellExecuteExW
comctl32
_TrackMouseEvent
InitCommonControlsEx
shlwapi
SHCopyKeyW
PathFindExtensionW
PathFindFileNameW
PathMatchSpecW
winmm
PlaySoundW
msi
ord173
ord217
oleacc
CreateStdAccessibleObject
LresultFromObject
Sections
CODE Size: 114KB - Virtual size: 114KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 868KB - Virtual size: 867KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 278KB - Virtual size: 277KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 826KB - Virtual size: 826KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ