Static task
static1
Behavioral task
behavioral1
Sample
59cb0eca818103244e9d3812600269cf57f6d341d3bdbbbe4d2f3dd26a476646.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
59cb0eca818103244e9d3812600269cf57f6d341d3bdbbbe4d2f3dd26a476646.exe
Resource
win10v2004-20220721-en
General
-
Target
59cb0eca818103244e9d3812600269cf57f6d341d3bdbbbe4d2f3dd26a476646
-
Size
821KB
-
MD5
685634dac8b4c2b9429e80f8cd572563
-
SHA1
2c55e2ae8fc5b9426144b1045739552198ea8461
-
SHA256
59cb0eca818103244e9d3812600269cf57f6d341d3bdbbbe4d2f3dd26a476646
-
SHA512
b5f965e91e7949fab6fa519bbba1c3dbdad2e4e2410ac23ee8412f61c0bce3f160febb1c34b9db71d25782dd0784d3b3b1bfea5186b61f0b89394f196e7648b4
-
SSDEEP
12288:XMrHV0Hmopmr6/ANpz62zZlU6RknE+dvotod75u1gfDHu4T2N:XY0GgwMAr7MnfFplw4W
Malware Config
Signatures
Files
-
59cb0eca818103244e9d3812600269cf57f6d341d3bdbbbe4d2f3dd26a476646.exe windows x86
f2cd07f5ef618867890b0f8d42900ddc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteFile
SetFilePointer
FlushFileBuffers
GetCurrentProcess
CreateFileA
HeapAlloc
HeapFree
HeapReAlloc
VirtualAlloc
GetCommandLineA
GetProcessHeap
GetStartupInfoA
RaiseException
RtlUnwind
HeapSize
VirtualFree
HeapCreate
GetStdHandle
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
Sleep
GetACP
IsValidCodePage
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetOEMCP
GetCPInfo
GetLocaleInfoA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpW
GetVersionExA
GetThreadLocale
GlobalGetAtomNameA
GlobalFlags
lstrcmpA
GetCurrentThreadId
CloseHandle
InterlockedIncrement
FreeLibrary
InterlockedDecrement
GetModuleHandleA
GetProcAddress
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GetCurrentProcessId
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
FindResourceA
LoadResource
LockResource
SizeofResource
SetLastError
GetVersion
GetEnvironmentVariableA
OpenMutexA
DeleteFileA
FindFirstChangeNotificationA
WideCharToMultiByte
DuplicateHandle
LoadLibraryA
GetModuleFileNameA
SetSystemTimeAdjustment
PeekNamedPipe
GetCurrentThread
CompareStringA
MultiByteToWideChar
GetNativeSystemInfo
ReleaseMutex
ResetEvent
lstrlenA
FindNextChangeNotification
InterlockedExchange
GetFileAttributesA
VirtualProtectEx
CreateMutexA
GetLastError
CreateProcessA
HeapDestroy
ExitProcess
user32
SetForegroundWindow
GetClientRect
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
DefWindowProcA
CallWindowProcA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetFocus
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameA
PtInRect
GetWindowTextA
SetWindowTextA
UnregisterClassA
SetWindowsHookExA
CallNextHookEx
DispatchMessageA
GetKeyState
PeekMessageA
GetSystemMetrics
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
UnhookWindowsHookEx
GetWindowThreadProcessId
SendMessageA
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
MessageBoxA
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
DestroyIcon
DrawEdge
GetKeyNameTextA
SetDlgItemTextA
OffsetRect
TrackPopupMenu
DrawFrameControl
GetActiveWindow
PostMessageA
DeferWindowPos
EndDialog
SetWindowLongA
MapDialogRect
GrayStringA
DrawTextExA
DrawTextA
GetMessageA
LoadIconA
IsDialogMessageA
TranslateMessage
BeginDeferWindowPos
UnregisterHotKey
CreateMenu
IsDlgButtonChecked
RegisterWindowMessageA
CloseClipboard
FillRect
AppendMenuA
PostQuitMessage
LoadCursorA
TabbedTextOutA
DestroyMenu
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
IsWindow
GetForegroundWindow
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
ValidateRect
gdi32
GetClipBox
SetTextColor
SetBkColor
SetMapMode
PtVisible
RectVisible
CreateBitmap
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetStockObject
GetDeviceCaps
CreateFontIndirectA
ExtTextOutA
BitBlt
SaveDC
DeleteDC
Rectangle
DPtoLP
DeleteObject
GetObjectA
TextOutA
RestoreDC
StartDocA
CreatePen
CreateDCA
StartPage
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
ole32
OleCreate
OleInitialize
StgCreateDocfile
CoSuspendClassObjects
CoUninitialize
OleUninitialize
CoInitialize
oleaut32
VariantClear
VariantChangeType
VariantInit
sisbkup
SisFreeAllocatedMemory
SisCreateBackupStructure
SisFreeBackupStructure
SisRestoredCommonStoreFile
SisRestoredLink
SisCSFilesToBackupForLink
ws2_32
ntohl
getsockname
WSAStartup
WSACleanup
recv
getpeername
listen
ioctlsocket
socket
inet_addr
send
gethostbyname
setsockopt
sendto
oleacc
LresultFromObject
CreateStdAccessibleObject
Sections
.text Size: 505KB - Virtual size: 505KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 102KB - Virtual size: 101KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 211KB - Virtual size: 4.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 952B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ