Static task
static1
Behavioral task
behavioral1
Sample
bde1c84e935883985c0f318031b63dea3dfd5b3e9ee25abcb9dd575be4310339.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
bde1c84e935883985c0f318031b63dea3dfd5b3e9ee25abcb9dd575be4310339.exe
Resource
win10v2004-20230220-en
General
-
Target
bde1c84e935883985c0f318031b63dea3dfd5b3e9ee25abcb9dd575be4310339
-
Size
857KB
-
MD5
2241f95569cdade914d6c6fb2a691911
-
SHA1
167ba7879f170ca96b4632d8c00f38d2515bd73a
-
SHA256
bde1c84e935883985c0f318031b63dea3dfd5b3e9ee25abcb9dd575be4310339
-
SHA512
11da9c23a5e1f2a661c4a925df1c2c65d538129dee1bf77cd56dee29e98e2c0e950e9c1d53636c995a22f176b5e9784684b52fd87db931161824b657f6776800
-
SSDEEP
12288:sQoHVfenwg323A5oJybukxwQb96fgUkbUPks0/y6/gD:sQqFeni3A5oJEukxz4Pks4/gD
Malware Config
Signatures
Files
-
bde1c84e935883985c0f318031b63dea3dfd5b3e9ee25abcb9dd575be4310339.exe windows x86
55a95106bcb773d4f4793f6366fc85af
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateDirectoryW
FindFirstFileW
FindClose
GetSystemDirectoryW
GetComputerNameW
GetTempPathW
WideCharToMultiByte
WaitForSingleObject
FindFirstFileA
GetPrivateProfileStringA
ReadFile
MultiByteToWideChar
WritePrivateProfileStringW
GetPrivateProfileStringW
GetLocalTime
DeleteFileW
Sleep
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
LocalFree
GetCommandLineW
SetCurrentDirectoryW
GetModuleFileNameW
CloseHandle
GetLastError
CreateProcessW
CreateMutexW
HeapSize
SetEndOfFile
GetFileAttributesExW
WriteConsoleW
GetProcessHeap
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SleepEx
GetTickCount
FreeLibrary
GetProcAddress
WaitForMultipleObjects
GetFileType
GetStdHandle
PeekNamedPipe
ExpandEnvironmentStringsA
SetLastError
FormatMessageA
VerSetConditionMask
LoadLibraryA
GetModuleHandleA
GetSystemDirectoryA
VerifyVersionInfoA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
GetModuleHandleW
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
EncodePointer
RaiseException
RtlUnwind
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
CreateFileW
GetDriveTypeW
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
SetFilePointerEx
ExitProcess
WriteFile
GetACP
GetConsoleMode
ReadConsoleW
GetConsoleCP
HeapFree
HeapAlloc
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetStringTypeW
GetTimeZoneInformation
HeapReAlloc
GetCurrentDirectoryW
GetFullPathNameW
SetStdHandle
FlushFileBuffers
DecodePointer
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetOEMCP
GetCPInfo
user32
GetSystemMetrics
GetDesktopWindow
GetForegroundWindow
PostMessageW
GetWindowThreadProcessId
GetShellWindow
GetWindowRect
advapi32
CryptAcquireContextA
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
CryptReleaseContext
CryptGetHashParam
CryptCreateHash
CryptHashData
CryptDestroyHash
CryptDestroyKey
CryptImportKey
CryptEncrypt
shell32
CommandLineToArgvW
ShellExecuteW
SHChangeNotify
SHGetSpecialFolderPathW
ShellExecuteExW
ole32
CoUninitialize
CoInitialize
shlwapi
PathIsDirectoryW
PathRemoveFileSpecW
urlmon
URLDownloadToFileW
ws2_32
getsockopt
htons
ntohs
setsockopt
socket
WSAIoctl
getaddrinfo
freeaddrinfo
accept
listen
recvfrom
sendto
ioctlsocket
gethostname
getsockname
getpeername
connect
bind
send
recv
WSASetLastError
select
__WSAFDIsSet
WSAGetLastError
WSACleanup
WSAStartup
closesocket
wldap32
ord301
ord200
ord30
ord35
ord33
ord32
ord27
ord26
ord22
ord41
ord50
ord60
ord79
ord211
ord46
ord143
Sections
.text Size: 540KB - Virtual size: 540KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 112KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 428B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 178KB - Virtual size: 177KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ