Static task
static1
Behavioral task
behavioral1
Sample
bf877c0ffb0e71ad0f8cd53ea45d2ecfc41e9deb6fa4dd30252c1b7e276026bb.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
bf877c0ffb0e71ad0f8cd53ea45d2ecfc41e9deb6fa4dd30252c1b7e276026bb.exe
Resource
win10v2004-20230220-en
General
-
Target
bf877c0ffb0e71ad0f8cd53ea45d2ecfc41e9deb6fa4dd30252c1b7e276026bb
-
Size
2.1MB
-
MD5
1bd27342ff530444dcf15fa0644f2593
-
SHA1
b6c9d547e52f75b420ffa095aab9b77a07709d84
-
SHA256
bf877c0ffb0e71ad0f8cd53ea45d2ecfc41e9deb6fa4dd30252c1b7e276026bb
-
SHA512
b70a814a95e9deac379d8426d397f51c3778d39662f6d932f5a19e965ce005976c12b586070fe85e55799e2739fc2f0dd144e089ec8bb8026acbb839d25ced13
-
SSDEEP
49152:M9zPkt7qFJMN9Gn4zeujdGfCXcTADyp/S:g2yJMN9Gn4zdGfCX2q
Malware Config
Signatures
Files
-
bf877c0ffb0e71ad0f8cd53ea45d2ecfc41e9deb6fa4dd30252c1b7e276026bb.exe windows x86
f3d94ff18ef7e885872f34c178458a0c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnumResourceLanguagesA
ConvertDefaultLocale
GetCurrentThreadId
GlobalDeleteAtom
SetThreadPriority
ResumeThread
SuspendThread
SetErrorMode
GlobalGetAtomNameA
GetModuleFileNameW
TlsGetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
GetCurrentDirectoryA
GlobalFlags
GlobalAddAtomA
lstrcmpW
GlobalFindAtomA
GetCPInfo
GetOEMCP
HeapReAlloc
VirtualAlloc
GetSystemTimeAsFileTime
GetTimeFormatA
GetDateFormatA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
GetLocaleInfoA
SetStdHandle
GetFileType
ExitThread
CreateThread
HeapSize
HeapDestroy
HeapCreate
VirtualFree
GetStdHandle
GetACP
IsValidCodePage
GetStringTypeA
GetStringTypeW
LCMapStringW
GetTimeZoneInformation
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStartupInfoA
QueryPerformanceCounter
GetConsoleCP
GetConsoleMode
GetUserDefaultLCID
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
FindActCtxSectionStringA
LoadLibraryExA
InterlockedCompareExchange
lstrcmpA
GetFileAttributesA
SetFileAttributesA
SystemTimeToFileTime
LocalFileTimeToFileTime
FindNextFileA
FileTimeToLocalFileTime
GetFullPathNameA
DuplicateHandle
GetFileSize
UnlockFile
LockFile
GetThreadLocale
SetLastError
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
GetVersionExA
GetNativeSystemInfo
GetVolumeNameForVolumeMountPointA
LCMapStringA
MoveFileExA
GetCommandLineA
GetProcessTimes
CopyFileA
ExitProcess
FreeLibrary
GetSystemTime
GetPrivateProfileStringA
DeleteCriticalSection
DisconnectNamedPipe
InitializeCriticalSection
FlushFileBuffers
CreateEventA
ConnectNamedPipe
CreateNamedPipeA
SetEvent
WritePrivateProfileStringA
SetFileTime
Wow64RevertWow64FsRedirection
Wow64DisableWow64FsRedirection
CreateDirectoryA
GetVolumeInformationA
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetCurrentThread
IsWow64Process
DeleteFileA
TerminateProcess
CreateProcessA
GetCurrentProcess
FormatMessageA
HeapAlloc
GetPrivateProfileIntA
GetProcessHeap
HeapFree
LeaveCriticalSection
EnterCriticalSection
GetFileTime
GetModuleFileNameA
VirtualAllocEx
OpenProcess
ProcessIdToSessionId
GetCurrentProcessId
Process32Next
Process32First
Module32Next
Module32First
CreateToolhelp32Snapshot
GetModuleHandleA
GetProcAddress
Sleep
WaitForSingleObject
LoadLibraryA
CreateRemoteThread
VirtualFreeEx
WriteProcessMemory
GetDiskFreeSpaceExA
GetDriveTypeA
GetTickCount
LocalFree
LocalAlloc
GetSystemWindowsDirectoryA
InterlockedDecrement
InterlockedIncrement
LoadResource
LockResource
SizeofResource
FindClose
FindFirstFileA
ReadFile
GetFileSizeEx
SetEndOfFile
CreateFileW
CloseHandle
WriteFile
SetFilePointer
CreateFileA
FindResourceA
InterlockedExchange
CompareStringW
GetStringTypeExA
GetLastError
lstrlenA
CompareStringA
MultiByteToWideChar
GetVersion
RaiseException
WideCharToMultiByte
user32
RegisterWindowMessageA
LoadIconA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
IsWindow
GetForegroundWindow
CharUpperA
LoadStringA
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameA
PtInRect
SetWindowTextA
ClientToScreen
ShowWindow
UnregisterClassA
DestroyMenu
SendMessageTimeoutW
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
GetSystemMetrics
MessageBoxA
EnableWindow
IsWindowEnabled
GetLastActivePopup
GetWindowLongA
GetParent
SendMessageA
GetWindowThreadProcessId
PostQuitMessage
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
SetCursor
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
UnhookWindowsHookEx
LoadCursorA
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
GetWindowTextA
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
PostMessageA
gdi32
GetStockObject
ScaleWindowExtEx
SetWindowExtEx
GetDeviceCaps
CreateBitmap
SaveDC
RestoreDC
SetBkColor
SetTextColor
SetMapMode
GetClipBox
DeleteObject
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SelectObject
SetViewportOrgEx
DeleteDC
ScaleViewportExtEx
OffsetViewportOrgEx
SetViewportExtEx
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegQueryValueA
RegEnumKeyA
InitializeSecurityDescriptor
SetServiceStatus
RegisterServiceCtrlHandlerA
StartServiceCtrlDispatcherA
SetSecurityDescriptorDacl
ControlService
StartServiceA
QueryServiceStatus
DeleteService
OpenServiceA
RegOpenKeyA
CloseServiceHandle
CreateServiceA
OpenSCManagerA
QueryServiceConfigW
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
CreateWellKnownSid
ConvertSidToStringSidA
LookupAccountSidA
LookupAccountNameA
RegOpenKeyExA
RegCloseKey
RegisterEventSourceA
ReportEventA
DeregisterEventSource
RegCreateKeyExA
RegSetValueExA
OpenProcessToken
DuplicateTokenEx
SetTokenInformation
CreateProcessAsUserA
LookupPrivilegeValueA
AdjustTokenPrivileges
GetTokenInformation
RegEnumKeyExA
RegQueryValueExA
RegDeleteKeyA
shlwapi
PathIsUNCA
PathStripToRootA
UrlUnescapeA
PathFindFileNameA
PathFindExtensionA
ole32
CoSetProxyBlanket
OleRun
CoInitializeSecurity
CoInitializeEx
CoCreateInstance
oleaut32
SafeArrayDestroy
VariantInit
SysFreeString
VariantClear
VariantChangeType
VariantCopy
SafeArrayPutElement
SafeArrayCreateVector
SysAllocStringLen
SysAllocString
SafeArrayUnaccessData
SysAllocStringByteLen
SafeArrayAccessData
SysStringByteLen
SafeArrayGetUBound
SafeArrayGetLBound
GetErrorInfo
ws2_32
accept
inet_ntoa
listen
bind
inet_addr
WSACleanup
gethostname
gethostbyname
recv
send
closesocket
connect
htons
socket
gethostbyaddr
WSAStartup
WSAGetLastError
iphlpapi
SendARP
GetAdaptersInfo
netapi32
NetApiBufferFree
NetQueryDisplayInformation
NetUserDel
NetLocalGroupGetMembers
NetUserSetInfo
NetUserAdd
NetUserGetInfo
activeds
ord5
ord6
ord4
ord3
wtsapi32
WTSLogoffSession
WTSQuerySessionInformationA
WTSEnumerateProcessesA
WTSFreeMemory
WTSEnumerateSessionsA
WTSQueryUserToken
wininet
InternetQueryOptionA
InternetCanonicalizeUrlA
InternetCrackUrlA
InternetCloseHandle
InternetReadFile
HttpQueryInfoA
InternetOpenA
InternetQueryDataAvailable
InternetWriteFile
InternetOpenUrlA
InternetSetFilePointer
InternetSetStatusCallback
InternetGetLastResponseInfoA
Sections
.text Size: 1.7MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 390KB - Virtual size: 390KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ