Static task
static1
Behavioral task
behavioral1
Sample
f58c4c7ce60851d6870ff0a468955869ed54a560c46b72700471d2bba31dbf42.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f58c4c7ce60851d6870ff0a468955869ed54a560c46b72700471d2bba31dbf42.exe
Resource
win10v2004-20220812-en
General
-
Target
f58c4c7ce60851d6870ff0a468955869ed54a560c46b72700471d2bba31dbf42
-
Size
70KB
-
MD5
7774f76aeb2a1c6a681e45f9ba686c27
-
SHA1
6b1fea176adec6d3abcb4ad56cfd3c606c4cfc58
-
SHA256
f58c4c7ce60851d6870ff0a468955869ed54a560c46b72700471d2bba31dbf42
-
SHA512
159513281eef15bd4fabebea4dc54709a3ac97543585ff1cdc69f7278ede43d9a777fc6d923cd19c30a6220733e4b8b9fbd906c72db473dae72be0cd96ef508f
-
SSDEEP
1536:kpB/plCXRzIGRnDyB2QypAPvVf19GeupnhWKn4SDu:kpRplChMGRDy3IA97Geupnhh4SDu
Malware Config
Signatures
Files
-
f58c4c7ce60851d6870ff0a468955869ed54a560c46b72700471d2bba31dbf42.exe windows x86
f36b46f28022ee4585e06a33f3539738
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThreadId
GetVersionExA
WaitForSingleObject
InitializeCriticalSection
HeapDestroy
DeleteCriticalSection
lstrlenW
WinExec
lstrcatA
FreeResource
GlobalFree
GlobalHandle
LockResource
LoadResource
FindResourceA
GlobalAlloc
EnterCriticalSection
GlobalLock
InterlockedIncrement
InterlockedDecrement
WideCharToMultiByte
lstrcmpA
FlushInstructionCache
GetCurrentProcess
FindClose
FindFirstFileA
LeaveCriticalSection
Sleep
GetTickCount
WriteFile
MultiByteToWideChar
DeleteFileA
CreateFileA
SetFilePointer
CreateThread
ResumeThread
GetModuleHandleA
GetProcAddress
CreateMutexA
GetLastError
CloseHandle
GetTempPathA
lstrlenA
CreateDirectoryA
lstrcpyA
GlobalUnlock
CreateProcessA
GetStartupInfoA
user32
CharLowerA
PostMessageA
ShowWindow
GetWindowRect
SetWindowPos
SetWindowTextA
SetTimer
InvalidateRgn
EndDialog
GetDlgItem
EnableWindow
DefWindowProcA
DialogBoxParamA
KillTimer
InvalidateRect
SetCapture
ReleaseCapture
CreateAcceleratorTableA
GetWindowTextLengthA
GetClassNameA
RedrawWindow
GetDesktopWindow
BeginPaint
FillRect
EndPaint
CallWindowProcA
DestroyWindow
SetFocus
MessageBeep
SetDlgItemTextA
GetWindowTextA
GetDlgItemInt
SetDlgItemInt
CreateWindowExA
MessageBoxA
GetActiveWindow
GetDC
ReleaseDC
GetFocus
IsChild
GetSysColor
IsWindow
SetRect
wsprintfA
LoadStringA
CharNextA
SetWindowLongA
RegisterWindowMessageA
GetClassInfoExA
LoadCursorA
RegisterClassExA
DialogBoxIndirectParamA
GetWindowLongA
GetParent
GetWindow
GetClientRect
MapWindowPoints
SendMessageA
SystemParametersInfoA
gdi32
GetStockObject
GetObjectA
DeleteObject
CreateCompatibleBitmap
CreateCompatibleDC
SelectObject
BitBlt
DeleteDC
CreateSolidBrush
GetDeviceCaps
advapi32
RegCloseKey
RegQueryValueA
RegSetValueExA
RegQueryValueExA
RegCreateKeyExA
RegOpenKeyExA
RegDeleteKeyA
ole32
OleLockRunning
CoTaskMemAlloc
StringFromCLSID
CoCreateInstance
CLSIDFromString
CLSIDFromProgID
OleUninitialize
OleInitialize
CreateStreamOnHGlobal
CoCreateGuid
CoInitialize
CoUninitialize
CoTaskMemFree
oleaut32
OleCreateFontIndirect
DispCallFunc
SysAllocString
SysStringLen
LoadRegTypeLi
SysAllocStringLen
SysFreeString
VariantClear
comctl32
InitCommonControlsEx
wininet
InternetCanonicalizeUrlA
InternetCrackUrlA
InternetOpenA
InternetSetStatusCallback
InternetConnectA
HttpOpenRequestA
HttpSendRequestA
HttpQueryInfoA
InternetReadFile
InternetSetOptionA
InternetErrorDlg
InternetQueryOptionA
InternetCloseHandle
msvcrt
strstr
??2@YAPAXI@Z
_ftol
atol
atoi
_mbsrchr
atof
_mbscmp
_mbsstr
free
wcslen
_ismbcspace
memmove
vsprintf
malloc
_ismbcdigit
_purecall
__dllonexit
_onexit
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
??3@YAXPAX@Z
shell32
ShellExecuteA
Sections
.rdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ