Static task
static1
Behavioral task
behavioral1
Sample
bae9895ad4e392990a09b1b8a01e424a7ad3769e538ac693919d1b99989f0cb3.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
bae9895ad4e392990a09b1b8a01e424a7ad3769e538ac693919d1b99989f0cb3.exe
Resource
win10v2004-20230220-en
General
-
Target
bae9895ad4e392990a09b1b8a01e424a7ad3769e538ac693919d1b99989f0cb3
-
Size
173KB
-
MD5
cdc4eb983e5d29836b743afc06090097
-
SHA1
155010ce434c72ff1e4594b82d95caf1479ff5e2
-
SHA256
bae9895ad4e392990a09b1b8a01e424a7ad3769e538ac693919d1b99989f0cb3
-
SHA512
796026fe8356b1d51d2f3b83c1f02e5e26290e1e19184d22bc198f244ba08af572503a1e680629e74cbac5631b4435d8ac2f3743ccf49148f3d91af68b8fc08a
-
SSDEEP
3072:eOcU8Obes0Y6C/epLAEAIxEt+UvdgiQ945b2Xov2Vf60ofFfITQD13WyPqfpmbj2:XcDseNVCWaaEgueI24v2cxf+yyfmkx
Malware Config
Signatures
Files
-
bae9895ad4e392990a09b1b8a01e424a7ad3769e538ac693919d1b99989f0cb3.exe windows x86
4cf470fab15d30af058620f22bafa840
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
CryptAcquireContextA
CryptReleaseContext
CryptGetHashParam
CryptCreateHash
CryptHashData
CryptDestroyHash
GetUserNameA
GetCurrentHwProfileA
RegCloseKey
RegCreateKeyExW
RegSetValueExW
user32
TranslateMessage
DispatchMessageA
DefWindowProcW
RegisterClassA
GetMessageA
CreateWindowExA
DestroyWindow
UnregisterClassA
ws2_32
gethostbyname
WSACleanup
WSAStartup
crypt32
CryptBinaryToStringA
wininet
InternetGetConnectedState
HttpSendRequestA
InternetReadFile
shell32
ShellExecuteA
SHCreateDirectoryExW
SHCreateDirectoryExA
kernel32
HeapReAlloc
HeapSize
ReadConsoleW
FlushFileBuffers
GetProcessHeap
GetStringTypeW
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
WriteConsoleW
SetEndOfFile
GetACP
IsValidCodePage
FindFirstFileExW
CloseHandle
WaitForMultipleObjects
CreateThread
MultiByteToWideChar
WideCharToMultiByte
LoadLibraryA
CreateFileA
GetFileSize
ReadFile
MapViewOfFile
UnmapViewOfFile
CreateFileMappingA
GetLogicalDrives
GetVolumeInformationA
Sleep
GetModuleFileNameW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetComputerNameA
FindClose
FindFirstFileW
FindNextFileW
GetDiskFreeSpaceExW
GetDriveTypeW
GetWindowsDirectoryW
GetModuleHandleA
DeleteFileW
CreateFileW
WriteFile
TerminateProcess
OpenProcess
QueryFullProcessImageNameW
GetVolumeInformationW
CopyFileW
GetFileTime
CreateProcessA
GetModuleFileNameA
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
LCMapStringW
RaiseException
RtlUnwind
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
ExitProcess
GetModuleHandleExW
MoveFileExW
GetStdHandle
GetCommandLineA
GetCommandLineW
HeapFree
HeapAlloc
GetFileType
GetConsoleOutputCP
GetConsoleMode
GetFileSizeEx
SetFilePointerEx
CompareStringW
DecodePointer
Sections
.text Size: 127KB - Virtual size: 126KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ