Static task
static1
Behavioral task
behavioral1
Sample
587467a89fd0432bb992085167360956a221858b9c3e80334b58e493b89ae6a1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
587467a89fd0432bb992085167360956a221858b9c3e80334b58e493b89ae6a1.exe
Resource
win10v2004-20220901-en
General
-
Target
587467a89fd0432bb992085167360956a221858b9c3e80334b58e493b89ae6a1
-
Size
256KB
-
MD5
61b54adc40e6786b2023106c880c72bf
-
SHA1
fd6a0896baa3b6fe65e84379ad724a805637f02d
-
SHA256
587467a89fd0432bb992085167360956a221858b9c3e80334b58e493b89ae6a1
-
SHA512
aa5944180bab5c8db0ca74764d3e43a364b1771c450f7a2560af5d352520a883216c83b9982f53866c46f15de2ec72de60e3543df1b6dd125efca0522c8db4ed
-
SSDEEP
6144:2vMGYT72ByQG8Q0I7PZC8zlrXAuSE4YNpfrd:2vMGQiJG8Q0I7PZC8zlrX0E4qp
Malware Config
Signatures
Files
-
587467a89fd0432bb992085167360956a221858b9c3e80334b58e493b89ae6a1.exe windows x86
3507bfe6a64429efb01a42b9c40f08f5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
timeGetTime
kernel32
RtlUnwind
CreateThread
HeapAlloc
ExitThread
GetSystemTimeAsFileTime
GetStartupInfoA
GetCommandLineA
ExitProcess
HeapFree
RaiseException
TerminateProcess
HeapSize
GetACP
GetTimeZoneInformation
HeapDestroy
HeapCreate
VirtualFree
HeapReAlloc
VirtualAlloc
IsBadWritePtr
UnhandledExceptionFilter
LCMapStringW
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
SetUnhandledExceptionFilter
GetStringTypeA
GetOEMCP
DuplicateHandle
IsBadCodePtr
FormatMessageA
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetFileTime
GetFileSize
GetFileAttributesA
GetTickCount
FileTimeToLocalFileTime
FileTimeToSystemTime
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
SetEndOfFile
UnlockFile
LockFile
SetFilePointer
GetCurrentProcess
LCMapStringA
SetErrorMode
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
FlushFileBuffers
FreeLibrary
GetThreadContext
SetThreadContext
WriteProcessMemory
ReadProcessMemory
WaitForDebugEvent
ContinueDebugEvent
ReadFile
WriteFile
GetSystemDirectoryA
CreateProcessA
WaitForSingleObject
CreateFileA
CloseHandle
GetModuleHandleA
FindResourceA
LoadResource
SizeofResource
LockResource
GetLastError
GetProcessVersion
GetCPInfo
GetThreadLocale
WritePrivateProfileStringA
lstrcpynA
GlobalFlags
TlsSetValue
TlsGetValue
LocalReAlloc
LeaveCriticalSection
EnterCriticalSection
GlobalReAlloc
DeleteCriticalSection
TlsFree
GlobalHandle
LocalFree
TlsAlloc
InitializeCriticalSection
WideCharToMultiByte
LocalAlloc
MultiByteToWideChar
MulDiv
lstrlenA
InterlockedIncrement
GetVersion
SetLastError
LoadLibraryA
GlobalAddAtomA
lstrcatA
GlobalGetAtomNameA
GetProcAddress
GlobalFindAtomA
lstrcpyA
GlobalFree
InterlockedDecrement
GlobalUnlock
GetModuleFileNameA
ResumeThread
GlobalDeleteAtom
GlobalLock
GlobalAlloc
GetStringTypeW
lstrcmpA
IsBadReadPtr
user32
CopyAcceleratorTableA
MessageBeep
DestroyMenu
CharUpperA
RegisterClipboardFormatA
PostThreadMessageA
PtInRect
GetClassNameA
GetDesktopWindow
GrayStringA
TabbedTextOutA
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
UpdateWindow
SendDlgItemMessageA
MapWindowPoints
GetSysColor
SetFocus
AdjustWindowRectEx
CopyRect
SetRect
GetNextDlgGroupItem
GetTopWindow
IsChild
GetCapture
WinHelpA
wsprintfA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSysColorBrush
GetMenuItemID
GetWindowTextA
GetDlgCtrlID
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
SetWindowLongA
OffsetRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
MapDialogRect
SetWindowPos
GetWindow
SetWindowContextHelpId
UnhookWindowsHookEx
EndDialog
SetActiveWindow
IsWindow
CreateDialogIndirectParamA
GetDlgItem
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
CharNextA
LoadStringA
GetSubMenu
SetCursor
PostMessageA
MessageBoxA
RegisterWindowMessageA
DestroyWindow
UnregisterClassA
FindWindowA
EnableWindow
IsIconic
GetSystemMetrics
DrawIcon
SetTimer
GetMessageA
TranslateMessage
DispatchMessageA
DefWindowProcA
SendMessageA
BeginPaint
GetClientRect
DrawTextA
EndPaint
KillTimer
PostQuitMessage
LoadIconA
LoadCursorA
RegisterClassExA
CreateWindowExA
gdi32
DeleteObject
GetDeviceCaps
GetViewportExtEx
GetWindowExtEx
PtVisible
TextOutA
ExtTextOutA
RectVisible
Escape
GetTextColor
GetBkColor
LPtoDP
GetMapMode
DPtoLP
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
GetObjectA
SetBkColor
SetTextColor
CreateBitmap
GetClipBox
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegCreateKeyExA
RegCloseKey
CryptReleaseContext
CryptDestroyKey
CryptDeriveKey
CryptHashData
CryptCreateHash
CryptDestroyHash
CryptAcquireContextA
CryptGenKey
CryptGetUserKey
CryptGetProvParam
RegOpenKeyExA
RegSetValueExA
comctl32
ord17
oledlg
ord8
ole32
CoFreeUnusedLibraries
CoRegisterMessageFilter
CoTaskMemAlloc
CoTaskMemFree
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
OleIsCurrentClipboard
OleFlushClipboard
CoRevokeClassObject
OleUninitialize
OleInitialize
olepro32
ord253
oleaut32
SysAllocStringByteLen
SysStringLen
SysAllocString
VariantTimeToSystemTime
VariantChangeType
VariantCopy
VariantClear
SysAllocStringLen
SysFreeString
Sections
.text Size: 120KB - Virtual size: 117KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 84KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ