Static task
static1
Behavioral task
behavioral1
Sample
bd454928229f5d356a3bf19b5d5abb7d82ded8ffa72e56daff68e9bc0b806a0d.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
bd454928229f5d356a3bf19b5d5abb7d82ded8ffa72e56daff68e9bc0b806a0d.exe
Resource
win10v2004-20230220-en
General
-
Target
bd454928229f5d356a3bf19b5d5abb7d82ded8ffa72e56daff68e9bc0b806a0d
-
Size
2.5MB
-
MD5
1bf374dbee63ea4b30bec62e0787b319
-
SHA1
c1d9ed0dc9401ce53aff3e4bab5b0ce788b836b9
-
SHA256
bd454928229f5d356a3bf19b5d5abb7d82ded8ffa72e56daff68e9bc0b806a0d
-
SHA512
77ab0315015f11eaf805d0c60fd5c07e27200cb6d6144ac8d9a35d1661e0d0f761789e20f33e014fab10da4b3021da573084bf12603ffe29650837edd09a04a4
-
SSDEEP
49152:Mv60dRoV1Gfxrs62cBH2H3OuW6dFLm7eWRd+F6BFZgdgY3YP:+60boz66dFLm7eWRd+FCFS13YP
Malware Config
Signatures
Files
-
bd454928229f5d356a3bf19b5d5abb7d82ded8ffa72e56daff68e9bc0b806a0d.exe windows x86
a57253c0f284c4a233f3ef1df67dde39
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
visa32
ord131
ord141
ord132
ord134
ord279
ord269
qmsl_msvc10r
QLIB_IsPhoneConnected
QLIB_ConnectServer
QLIB_SetLibraryMode
QLIB_GetLibraryVersion
QLIB_EfsWrite
QLIB_EfsRead
QLIB_DIAG_EXT_BUILD_ID_F
QLIB_DIAG_NV_READ_F
QLIB_NV_WriteNVsToMobile
QLIB_NV_LoadNVsFromQCN
QLIB_DIAG_NV_WRITE_F
QLIB_DIAG_STATUS_F
QLIB_DIAG_SPC_F
QLIB_EFS2_SyncWithWait
QLIB_DIAG_CONTROL_F
QLIB_DisconnectServer
kernel32
SetLastError
FindNextFileA
DeleteCriticalSection
FileTimeToSystemTime
FileTimeToLocalFileTime
DuplicateHandle
GetCurrentProcess
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
GetVolumeInformationA
GetStringTypeExA
GetThreadLocale
GetShortPathNameA
GlobalReAlloc
TlsAlloc
GlobalHandle
TlsFree
TlsSetValue
LocalReAlloc
TlsGetValue
GlobalFlags
SizeofResource
GetProcessVersion
GetCPInfo
GetOEMCP
LocalFileTimeToFileTime
MulDiv
SetErrorMode
RtlUnwind
ExitProcess
TerminateProcess
GetTimeZoneInformation
GetSystemTime
HeapAlloc
RaiseException
HeapFree
GetCommandLineA
ExitThread
SetStdHandle
GetFileType
HeapReAlloc
HeapSize
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
IsValidLocale
IsValidCodePage
GetLocaleInfoA
EnumSystemLocalesA
GetUserDefaultLCID
SetUnhandledExceptionFilter
SetHandleCount
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
GetDriveTypeA
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetLocaleInfoW
GetDiskFreeSpaceA
GetFileTime
SetFileTime
GetFullPathNameA
GetTempFileNameA
GetFileAttributesA
SuspendThread
SetThreadPriority
ResumeThread
lstrcmpA
GetCurrentThread
lstrcpynA
GetVersion
lstrcatA
GetCurrentThreadId
GlobalGetAtomNameA
lstrcmpiA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcpyA
GetModuleHandleA
GlobalLock
GlobalUnlock
GlobalFree
LockResource
FindResourceA
LoadResource
InterlockedIncrement
GetSystemDirectoryA
MoveFileExA
LocalLock
LocalUnlock
GetModuleHandleW
ClearCommError
GetCommState
SetCommMask
SetupComm
SetCommTimeouts
SetCommState
PurgeComm
WaitCommEvent
GetOverlappedResult
GetACP
GetComputerNameA
GetCurrentDirectoryA
ResetEvent
CreateEventA
SetEvent
FindFirstFileA
FindClose
GetLocalTime
GetProfileStringA
MoveFileA
DeleteFileA
GetPrivateProfileIntA
WinExec
EnterCriticalSection
LeaveCriticalSection
CreateThread
InterlockedDecrement
FormatMessageA
lstrlenA
LocalAlloc
LocalFree
CreateDirectoryA
LoadLibraryA
GetProcAddress
FreeLibrary
InitializeCriticalSection
GlobalAlloc
WritePrivateProfileStringA
GetPrivateProfileStringA
WriteFile
SetFilePointer
CreateFileA
GetFileSize
InterlockedExchange
CreateProcessA
WaitForSingleObject
ReadFile
GetLastError
GetTickCount
Sleep
MultiByteToWideChar
WideCharToMultiByte
CloseHandle
GetModuleFileNameA
CreatePipe
GetStartupInfoA
SystemTimeToFileTime
user32
SetMenu
ReleaseCapture
TranslateAcceleratorA
LoadAcceleratorsA
InflateRect
CharUpperA
DestroyMenu
GrayStringA
DrawTextA
TabbedTextOutA
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GetDesktopWindow
FindWindowA
RegisterClipboardFormatA
MapDialogRect
SetWindowContextHelpId
GetMessageA
SetCursor
ShowOwnedPopups
PostQuitMessage
wvsprintfA
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
SetMenuItemBitmaps
EnableMenuItem
ShowWindow
MoveWindow
IsDialogMessageA
IsDlgButtonChecked
SetDlgItemTextA
CheckRadioButton
CheckDlgButton
SendDlgItemMessageA
MapWindowPoints
AdjustWindowRectEx
ScreenToClient
EqualRect
DeferWindowPos
ReuseDDElParam
CopyRect
EndDeferWindowPos
IsWindowVisible
ScrollWindow
GetScrollInfo
SetScrollInfo
ShowScrollBar
GetScrollRange
SetScrollRange
GetScrollPos
GetTopWindow
IsChild
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenuItemCount
GetMenuItemID
TrackPopupMenu
ShowCaret
ExcludeUpdateRgn
DefDlgProcA
IsWindowUnicode
GetWindowTextLengthA
GetWindowTextA
CreateWindowExA
GetSysColorBrush
CallNextHookEx
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
IntersectRect
SystemParametersInfoA
IsIconic
GetWindowPlacement
UnpackDDElParam
BringWindowToTop
IsZoomed
WindowFromPoint
LoadStringA
GetClassNameA
BeginDeferWindowPos
LoadCursorA
GetNextDlgTabItem
EndDialog
GetActiveWindow
SetActiveWindow
IsWindow
GetSystemMetrics
CreateDialogIndirectParamA
DestroyWindow
GetDlgItem
IsWindowEnabled
UnhookWindowsHookEx
MessageBoxA
SetRect
IsRectEmpty
FillRect
SetRectEmpty
ReleaseDC
OffsetRect
SetWindowTextA
GetWindowLongA
GetKeyState
SetFocus
GetCursorPos
PtInRect
ValidateRect
DrawFocusRect
GetParent
GetClientRect
GetSysColor
RedrawWindow
CheckMenuItem
DrawMenuBar
GetMessagePos
LoadMenuA
GetSubMenu
GetMenu
GetMenuState
PeekMessageA
DispatchMessageA
TranslateMessage
GetDC
KillTimer
LoadIconA
wsprintfA
InsertMenuA
DeleteMenu
GetWindowRect
InvalidateRect
PostMessageA
SetTimer
RegisterWindowMessageA
UpdateWindow
SendMessageA
GetFocus
GetDlgCtrlID
EnableWindow
GetMenuStringA
DestroyIcon
CharNextA
CopyAcceleratorTableA
GetNextDlgGroupItem
MessageBeep
SetParent
SetCapture
LockWindowUpdate
GetDCEx
SetWindowsHookExA
PostThreadMessageA
HideCaret
UnregisterClassA
SetScrollPos
gdi32
CombineRgn
CreateFontIndirectA
GetTextMetricsA
GetBkColor
SetRectRgn
CreateCompatibleDC
TextOutA
RectVisible
PtVisible
ExtTextOutA
GetMapMode
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
DPtoLP
LPtoDP
CreateRectRgnIndirect
PatBlt
CreateBitmap
GetObjectA
SetBkColor
SetTextColor
GetClipBox
GetTextExtentPoint32A
GetTextColor
Rectangle
GetTextExtentPointA
CreateDIBitmap
CreateFontA
CreateSolidBrush
BitBlt
CreatePen
CreatePatternBrush
GetWindowExtEx
GetViewportExtEx
GetDeviceCaps
CreateRectRgn
DeleteObject
LineTo
MoveToEx
IntersectClipRect
ExcludeClipRect
SelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetBkMode
Escape
comdlg32
GetOpenFileNameA
GetSaveFileNameA
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
EnumPrintersA
advapi32
SetFileSecurityA
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyExA
RegDeleteValueA
RegSetValueExA
RegEnumKeyA
RegSetValueA
RegCreateKeyA
GetFileSecurityA
RegCloseKey
RegDeleteKeyA
RegOpenKeyA
RegQueryValueA
shell32
DragQueryFileA
DragFinish
SHGetFileInfoA
SHBrowseForFolderA
SHGetPathFromIDListA
SHFileOperationA
ExtractIconA
comctl32
ord17
ImageList_Destroy
oledlg
ord8
ole32
CoRevokeClassObject
CoRegisterMessageFilter
CoTaskMemAlloc
CoTaskMemFree
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CoFreeUnusedLibraries
OleUninitialize
OleInitialize
CLSIDFromString
CLSIDFromProgID
CoInitialize
CoCreateInstance
OleRun
OleFlushClipboard
OleIsCurrentClipboard
olepro32
ord253
oleaut32
SysStringLen
VariantTimeToSystemTime
VariantCopy
VariantClear
SysAllocString
VariantInit
SysFreeString
VariantChangeType
SysAllocStringLen
SysAllocStringByteLen
GetErrorInfo
wininet
InternetCrackUrlA
InternetCanonicalizeUrlA
InternetQueryOptionA
InternetOpenA
InternetCloseHandle
InternetSetOptionExA
InternetSetStatusCallback
InternetSetFilePointer
InternetWriteFile
InternetReadFile
InternetQueryDataAvailable
InternetConnectA
FtpCreateDirectoryA
FtpSetCurrentDirectoryA
FtpGetCurrentDirectoryA
FtpPutFileA
FtpGetFileA
HttpOpenRequestA
HttpAddRequestHeadersA
HttpSendRequestA
HttpQueryInfoA
InternetGetLastResponseInfoA
winmm
PlaySoundA
libcrypto-3
RSA_new
RSA_public_encrypt
RSA_size
PEM_read_bio_RSA_PUBKEY
BIO_new_mem_buf
BIO_s_mem
PEM_read_bio_RSAPrivateKey
BIO_write
BIO_set_flags
BIO_push
BIO_f_base64
BIO_new
BIO_ctrl
RSA_free
BIO_free_all
RSA_private_decrypt
odbc32
ord2
ord41
ord10
ord1
ord50
ord45
ord51
ord15
ord9
ord14
ord3
ord11
ord18
ord13
ord61
ord16
ord5
Sections
.text Size: 1.7MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 188KB - Virtual size: 185KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 196KB - Virtual size: 224KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 396KB - Virtual size: 424KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE