bankall_inter
Static task
static1
Behavioral task
behavioral1
Sample
0e7cb27cb94b253044794ca874c4496e8ca8f13452b8d31439b11f657641994d.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0e7cb27cb94b253044794ca874c4496e8ca8f13452b8d31439b11f657641994d.dll
Resource
win10v2004-20240704-en
General
-
Target
0e7cb27cb94b253044794ca874c4496e8ca8f13452b8d31439b11f657641994d.exe
-
Size
164KB
-
MD5
0a58b6760b385298d1bb629248cd0120
-
SHA1
1bcc6df5d17dc3775562ffa016ddf21f366348cd
-
SHA256
0e7cb27cb94b253044794ca874c4496e8ca8f13452b8d31439b11f657641994d
-
SHA512
7488a385671e1cf58a0fabad6424ba3896b8e91a687abee39eba8bc48bbf4034c9fabfaadab6457762a4787a6d05d041ec33ad4c5154f82047832cdc162d9ed2
-
SSDEEP
3072:m8wPY1wpddEmOHh+jH9AWHSDtFuoycxviPafNaZJoOs:mrY1wddZEQjd4RvqafNn1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0e7cb27cb94b253044794ca874c4496e8ca8f13452b8d31439b11f657641994d.exe
Files
-
0e7cb27cb94b253044794ca874c4496e8ca8f13452b8d31439b11f657641994d.exe.dll windows:4 windows x86 arch:x86
efb57d2b0ff4b07a720e63da61c98f5f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
FlushFileBuffers
SetEndOfFile
MoveFileA
DeleteFileA
FindClose
FindFirstFileA
GetFullPathNameA
GetCPInfo
GetOEMCP
GetFileAttributesA
FileTimeToSystemTime
FileTimeToLocalFileTime
GetTimeZoneInformation
GetSystemTime
GetCommandLineA
RtlUnwind
ExitProcess
HeapFree
HeapAlloc
RaiseException
HeapSize
HeapReAlloc
GetACP
SetHandleCount
SetFilePointer
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetStdHandle
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
CreateDirectoryA
GetDriveTypeA
PeekNamedPipe
GetFileInformationByHandle
GetProcessVersion
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
SetLastError
MultiByteToWideChar
WideCharToMultiByte
InterlockedIncrement
GetCurrentDirectoryA
WritePrivateProfileStringA
GlobalFlags
GetVersion
lstrlenA
lstrcpynA
lstrcpyA
lstrcatA
SetErrorMode
InterlockedDecrement
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
TlsFree
GlobalHandle
GlobalUnlock
GlobalFree
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalFree
LocalAlloc
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
CreateProcessA
WaitForSingleObject
GetCurrentProcess
TerminateProcess
LoadLibraryA
GetLocalTime
ReadFile
CreateFileA
SetupComm
CloseHandle
PurgeComm
GetCommTimeouts
SetCommTimeouts
GetCommState
SetCommState
ClearCommError
WriteFile
FreeLibrary
LoadLibraryExA
GetLastError
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
GetStdHandle
Sleep
user32
DefWindowProcA
RemovePropA
CallWindowProcA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
DestroyWindow
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
DestroyMenu
SetForegroundWindow
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetSystemMetrics
SetFocus
ShowWindow
SetWindowPos
SetWindowLongA
GetMessageTime
GetDlgItem
GrayStringA
DrawTextA
TabbedTextOutA
ReleaseDC
GetDC
GetMenuItemCount
wsprintfA
GetWindowTextA
SetWindowTextA
ClientToScreen
GetWindow
GetWindowRect
PtInRect
GetClassNameA
UnregisterClassA
UnhookWindowsHookEx
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
PostQuitMessage
PostMessageA
SendMessageA
SetCursor
EnableWindow
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
MessageBoxA
GetMessagePos
GetForegroundWindow
GetDlgCtrlID
gdi32
SetTextColor
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
GetDeviceCaps
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
GetObjectA
SetBkColor
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
CreateBitmap
DeleteObject
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegSetValueExA
RegCloseKey
RegOpenKeyExA
RegCreateKeyExA
comctl32
ord17
Exports
Exports
Sections
.text Size: 100KB - Virtual size: 97KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ