Static task
static1
Behavioral task
behavioral1
Sample
59ba7877f1f763570adc77667a9131f7ac3979e78fe3bae5e5e4366c4363a2c7.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
59ba7877f1f763570adc77667a9131f7ac3979e78fe3bae5e5e4366c4363a2c7.exe
Resource
win10v2004-20220812-en
General
-
Target
59ba7877f1f763570adc77667a9131f7ac3979e78fe3bae5e5e4366c4363a2c7
-
Size
284KB
-
MD5
844ec5a930c6d6673e7df93153d74870
-
SHA1
d0a2e42153f034eb457282386da3b9ca804bed02
-
SHA256
59ba7877f1f763570adc77667a9131f7ac3979e78fe3bae5e5e4366c4363a2c7
-
SHA512
52954770a532f26fa96db4e996654e266f9217f4f450d39b981ffbc0c75e4d5b2c31f06785883211b69e636b48f16d9d1bf4bcf6e7cb14b0278eb514f27f8224
-
SSDEEP
6144:FGqyPc1RYUk/YUNE3asE8SPZpEpLR6N3WJn0vdXB61:gMRYUuhn8SPXEpFm3gnUS
Malware Config
Signatures
Files
-
59ba7877f1f763570adc77667a9131f7ac3979e78fe3bae5e5e4366c4363a2c7.exe windows x86
c33c96b25c947c2b12e496a46657ec90
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapAlloc
QueryPerformanceCounter
SetFileApisToOEM
MoveFileA
ScrollConsoleScreenBufferW
SetEvent
OpenMutexA
EnumResourceTypesA
GetDriveTypeW
GetLocaleInfoA
OpenFileMappingA
GetVolumeInformationW
FreeLibrary
GlobalGetAtomNameW
SetupComm
GetCommandLineW
CreateDirectoryExW
lstrcmpA
CreateDirectoryExA
MapViewOfFile
SetEnvironmentVariableW
VirtualFree
CreatePipe
LocalUnlock
GetLocaleInfoW
SetCommBreak
VirtualUnlock
CreateDirectoryW
DebugBreak
VirtualQuery
ExitProcess
GetFileAttributesExW
GetHandleInformation
GetConsoleCursorInfo
SetConsoleCursorPosition
GetSystemDefaultLangID
CallNamedPipeW
GlobalSize
DosDateTimeToFileTime
WriteFile
DuplicateHandle
CallNamedPipeA
LoadLibraryW
FindNextChangeNotification
OpenFile
GetSystemTime
FileTimeToDosDateTime
UnhandledExceptionFilter
GetThreadContext
FreeConsole
SetHandleInformation
VirtualAllocEx
BackupWrite
CreateEventA
GetCommandLineA
DeleteFileW
IsBadStringPtrW
GetCurrentDirectoryA
GetStringTypeExA
SetNamedPipeHandleState
GetBinaryTypeW
CreateSemaphoreW
GetModuleHandleW
LockFileEx
GetFileType
FormatMessageW
GetPrivateProfileSectionNamesA
LocalFree
WritePrivateProfileSectionW
FileTimeToSystemTime
UpdateResourceA
SetThreadPriorityBoost
GlobalAddAtomA
GetSystemTimeAsFileTime
GlobalFree
GetVersionExA
GetModuleHandleA
OutputDebugStringW
WriteConsoleOutputW
GetSystemDirectoryW
GetTempFileNameA
GetVersion
CreateProcessA
FindClose
SetErrorMode
ClearCommBreak
PrepareTape
SetConsoleActiveScreenBuffer
OpenProcess
WriteFileEx
WriteConsoleOutputCharacterA
GetTempFileNameW
_lwrite
FindCloseChangeNotification
GetStartupInfoA
EnterCriticalSection
GetProcessVersion
CreateFiber
EnumResourceLanguagesW
SetHandleCount
DeviceIoControl
ConnectNamedPipe
CreateConsoleScreenBuffer
GetFileAttributesA
VirtualProtect
user32
MapVirtualKeyA
CreatePopupMenu
RegisterClipboardFormatW
ChangeDisplaySettingsW
LoadBitmapA
DefMDIChildProcA
SystemParametersInfoW
CreateCaret
CheckMenuRadioItem
LoadKeyboardLayoutA
CharUpperW
GetWindowContextHelpId
BroadcastSystemMessageA
OffsetRect
AppendMenuA
IsMenu
MoveWindow
GetMenuCheckMarkDimensions
wsprintfW
IsIconic
ToUnicodeEx
EnumDisplaySettingsExW
RegisterClassW
CopyAcceleratorTableW
EnableWindow
DeferWindowPos
ClientToScreen
EnumClipboardFormats
SetWindowWord
IsWindowUnicode
DestroyMenu
TabbedTextOutW
CharPrevW
LookupIconIdFromDirectory
ScreenToClient
EndDialog
GetWindowTextW
GetMenuState
TranslateMDISysAccel
GetMenuItemID
gdi32
GetEnhMetaFileDescriptionA
CreateCompatibleDC
ResizePalette
CreateRectRgn
GetTextExtentPointW
ExtTextOutW
CreateICW
GetGlyphOutlineW
GetViewportOrgEx
GetBkMode
CreateBrushIndirect
SelectPalette
EqualRgn
EnumFontFamiliesA
GetCharacterPlacementW
Polyline
CreateDiscardableBitmap
StrokePath
GetFontData
advapi32
StartServiceCtrlDispatcherA
ReportEventA
shell32
SHGetPathFromIDListA
SHGetSettings
Shell_NotifyIconA
ShellExecuteW
ExtractAssociatedIconW
ole32
WriteFmtUserTypeStg
CoSuspendClassObjects
CoIsOle1Class
IIDFromString
SetConvertStg
ReadClassStg
CoResumeClassObjects
OleCreateMenuDescriptor
oleaut32
SysReAllocStringLen
RegisterTypeLi
VariantClear
CreateErrorInfo
GetErrorInfo
SysAllocStringLen
SetErrorInfo
SafeArrayAccessData
SysAllocString
VariantCopy
comctl32
ImageList_Draw
ImageList_Remove
CreatePropertySheetPageW
shlwapi
PathRemoveFileSpecA
SHSetValueA
PathIsDirectoryA
PathUnquoteSpacesA
StrFormatByteSizeW
PathAddExtensionW
PathFindExtensionA
PathFileExistsA
SHRegOpenUSKeyW
StrRChrA
UrlIsW
PathGetCharTypeW
StrCmpW
AssocQueryKeyW
StrCmpNIW
setupapi
SetupDiGetClassDescriptionExA
SetupGetLineCountA
SetupDiDeleteDeviceInfo
SetupOpenLog
SetupDiSetDeviceRegistryPropertyA
SetupCommitFileQueueA
SetupGetLineTextW
SetupGetLineCountW
SetupFindFirstLineA
SetupDiOpenDeviceInterfaceW
SetupScanFileQueueW
msvcrt
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
Sections
.text Size: 264KB - Virtual size: 261KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE