Static task
static1
Behavioral task
behavioral1
Sample
56f65c10cbea98eb20d9ceb247e90d610739a5622c6c6aceaa8dea5c5994866a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
56f65c10cbea98eb20d9ceb247e90d610739a5622c6c6aceaa8dea5c5994866a.exe
Resource
win10v2004-20220812-en
General
-
Target
56f65c10cbea98eb20d9ceb247e90d610739a5622c6c6aceaa8dea5c5994866a
-
Size
709KB
-
MD5
0c3db2b9afaa2120b9250d8f2524d9d0
-
SHA1
3b7a92835f325721c67f07ea05e429e58f657494
-
SHA256
56f65c10cbea98eb20d9ceb247e90d610739a5622c6c6aceaa8dea5c5994866a
-
SHA512
267301f5198562a057ffac90c9384f3314d7fea196fecae24ec685814c716b85308d4649bb835303a0a28243336022b0a7bdee3427c41f02519f4e135869f82d
-
SSDEEP
3072:xq9mmjycn2WJGHrj6fuf2PSxO3WXm+Xl+QAucxaibw:xqAm2rWJGH+uuPSk3WXouWbw
Malware Config
Signatures
Files
-
56f65c10cbea98eb20d9ceb247e90d610739a5622c6c6aceaa8dea5c5994866a.exe windows x86
b51500a8fbcd044c9a32916cbd9a87fb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameA
GetSystemDirectoryA
FindResourceA
FreeLibraryAndExitThread
PeekConsoleInputA
GetVersion
GetFileTime
EnumSystemLocalesA
GetCurrentProcess
GetLogicalDriveStringsA
WaitForSingleObject
FindNextFileA
GetPrivateProfileSectionW
LocalFree
GetComputerNameW
ReadProcessMemory
CreateToolhelp32Snapshot
CreateRemoteThread
DeviceIoControl
FileTimeToDosDateTime
FatalAppExitA
LoadModule
OutputDebugStringA
CloseHandle
FindClose
GetWindowsDirectoryA
LoadLibraryW
GetProcAddress
FindClose
GetLocalTime
GlobalDeleteAtom
GetLocaleInfoW
TerminateProcess
FindNextFileA
GetWindowsDirectoryA
CopyFileExW
GetModuleHandleA
MultiByteToWideChar
CreateProcessA
Process32Next
GetStringTypeW
OpenProcess
ExitProcess
Process32First
LockFile
ExitThread
GetPrivateProfileIntA
GetEnvironmentStrings
WriteProcessMemory
LoadLibraryA
user32
RegisterClassExA
DestroyIcon
DrawEdge
GetGUIThreadInfo
CreateWindowExA
CharUpperW
ShowWindow
CreateDialogIndirectParamW
DrawFrameControl
GetMessageA
GetKeyboardState
CallWindowProcA
DefWindowProcA
BroadcastSystemMessageW
DispatchMessageA
UpdateWindow
DrawIconEx
TranslateMessage
GetClassInfoW
GetQueueStatus
AppendMenuW
DdeFreeDataHandle
GetMenuItemInfoW
DrawTextExA
DrawTextW
DdeGetLastError
DefMDIChildProcA
advapi32
OpenProcessToken
CryptDestroyKey
CryptAcquireContextW
SetServiceStatus
RegSetValueA
QueryServiceStatus
OpenServiceA
CryptGenRandom
GetFileSecurityW
GetSecurityDescriptorGroup
GetNamedSecurityInfoA
CryptReleaseContext
RegCreateKeyExA
shell32
ExtractAssociatedIconW
SHHelpShortcuts_RunDLLW
ShellExecuteExW
RegenerateUserEnvironment
ExtractAssociatedIconA
SHLoadNonloadedIconOverlayIdentifiers
SHEmptyRecycleBinA
SHGetFileInfoW
SHChangeNotify
CommandLineToArgvW
StrChrIW
RealShellExecuteA
FreeIconList
StrRChrW
ExtractIconA
Control_RunDLLA
SHEmptyRecycleBinW
DuplicateIcon
SHGetIconOverlayIndexA
StrRStrIA
gdi32
CreateFontIndirectW
GetObjectA
EndPage
GetNearestPaletteIndex
CloseFigure
CreateFontA
GetKerningPairsW
CreateSolidBrush
Sections
.text Size: 184KB - Virtual size: 184KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 416KB - Virtual size: 416KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aspack Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sdata Size: - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE