Static task
static1
Behavioral task
behavioral1
Sample
58b349c793282532e1874661a64f8e5a4286c9477ecb3d08e77242359e3243b8.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
58b349c793282532e1874661a64f8e5a4286c9477ecb3d08e77242359e3243b8.exe
Resource
win10v2004-20220721-en
General
-
Target
58b349c793282532e1874661a64f8e5a4286c9477ecb3d08e77242359e3243b8
-
Size
543KB
-
MD5
0e7c4cb7365c823b11f7204d695b06a6
-
SHA1
403fc69b0124c9a8d5dd0bc36011ed6be1dff64e
-
SHA256
58b349c793282532e1874661a64f8e5a4286c9477ecb3d08e77242359e3243b8
-
SHA512
18b1b999e0b3c4333e837fc7f4c4b35dd908006eb9cfa6e05cdf3144fa6bbd69332b476b121e98912b7a315c8f4ac622bc341dfda7f2ffb726abdcd555ba24e9
-
SSDEEP
12288:gkmcBuPfaeiAE+61kPt8eY9iWYKPHyCHQ:gkmcgPipwPeP9iWYuHyCHQ
Malware Config
Signatures
Files
-
58b349c793282532e1874661a64f8e5a4286c9477ecb3d08e77242359e3243b8.exe windows x86
9d626509209e6b871f17bb87acf43956
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
HeapSize
GetConsoleMode
GetLocaleInfoA
HeapReAlloc
InitializeCriticalSection
GetConsoleCP
GetFileType
LoadLibraryA
FreeUserPhysicalPages
VirtualAllocEx
OpenProcess
GetCurrentProcessId
TlsGetValue
LeaveCriticalSection
FindFirstFileA
RemoveDirectoryA
HeapAlloc
GetLastError
GetStdHandle
lstrcpynA
DeleteFileW
HeapFree
GetModuleHandleA
GetCommandLineA
GetVersion
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
WideCharToMultiByte
GetStringTypeA
GetStringTypeW
MultiByteToWideChar
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetCPInfo
GetACP
GetOEMCP
SetHandleCount
CloseHandle
SetStdHandle
RtlUnwind
LCMapStringA
LCMapStringW
FlushFileBuffers
CompareStringA
FindResourceA
lstrlenA
lstrcpyA
FindClose
GetDiskFreeSpaceA
Sleep
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetFileSize
CreateFileA
GetFileAttributesA
lstrcatA
MoveFileExA
GetShortPathNameA
GetPrivateProfileSectionA
WritePrivateProfileStringA
WritePrivateProfileSectionA
GetModuleFileNameA
GetSystemDefaultLCID
MulDiv
ExitProcess
FindNextFileA
GetStartupInfoA
WaitForSingleObject
CreateProcessA
FormatMessageA
SetFilePointer
WriteFile
GetSystemTimeAsFileTime
GetVersionExA
GetProcessHeap
GetProcAddress
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
EnterCriticalSection
SetUnhandledExceptionFilter
IsDebuggerPresent
DeleteCriticalSection
QueryPerformanceCounter
GetTickCount
Sections
.text Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 490KB - Virtual size: 625KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ