Static task
static1
Behavioral task
behavioral1
Sample
e59047bd3c13eab2043b73a7847a288a2c9775b36f3f94fafba1cf77c3fc57e5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e59047bd3c13eab2043b73a7847a288a2c9775b36f3f94fafba1cf77c3fc57e5.exe
Resource
win10v2004-20220812-en
General
-
Target
e59047bd3c13eab2043b73a7847a288a2c9775b36f3f94fafba1cf77c3fc57e5
-
Size
4.8MB
-
MD5
1d283f6e0adc12bb4b7a3648486f6db3
-
SHA1
45e1e4db78968f989549a93111c94e8c1cebef44
-
SHA256
e59047bd3c13eab2043b73a7847a288a2c9775b36f3f94fafba1cf77c3fc57e5
-
SHA512
01e23ee1d10b3d87cb2fe1e9fe00a9ca4b6de56bd8aac3fff0e5b3927f821382ee1a32da32377b933f610781fffc7f249fc3e6b5b91d2be47edaf7c729197818
-
SSDEEP
98304:XR6C6riTnWRR3TBghr9nWPMsGTM/uibhAQ7Tfm/Cm6F:XRZ6riw3dg/WPMWA0Dm/g
Malware Config
Signatures
Files
-
e59047bd3c13eab2043b73a7847a288a2c9775b36f3f94fafba1cf77c3fc57e5.exe windows x86
eec6f78d206b8d002c4c6333314115c2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetCurrentDirectoryA
GetModuleHandleA
lstrcpyW
lstrcpynW
GetLocalTime
GetSystemTime
ConvertThreadToFiber
ConvertFiberToThread
GlobalMemoryStatus
CreateFiber
DeleteFiber
SwitchToFiber
SetConsoleMode
ReadConsoleA
LocalFileTimeToFileTime
SystemTimeToFileTime
SetFileTime
SetFilePointer
ExitProcess
GetACP
GetCurrentDirectoryW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindFirstFileExW
GetFullPathNameW
WriteConsoleW
SetEndOfFile
SetStdHandle
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
GlobalUnlock
GetTimeFormatW
GetDateFormatW
SetConsoleCtrlHandler
ReadConsoleW
GetModuleHandleExW
ExitThread
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
GetFileAttributesExW
SetFilePointerEx
GetConsoleMode
GetConsoleCP
GetTimeZoneInformation
RtlUnwind
CreateTimerQueue
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
ReleaseSemaphore
DuplicateHandle
VirtualProtect
FreeLibraryAndExitThread
GetThreadTimes
GetCurrentThread
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
SignalObjectAndWait
InitializeSListHead
GetStartupInfoW
IsProcessorFeaturePresent
UnhandledExceptionFilter
WaitForSingleObjectEx
ResetEvent
SetEvent
PeekNamedPipe
GetStdHandle
GetFileType
WaitForMultipleObjects
GetEnvironmentVariableA
GlobalLock
VerifyVersionInfoW
MulDiv
VerSetConditionMask
FormatMessageW
GetVersionExW
lstrlenW
TerminateProcess
GlobalAlloc
GetSystemDirectoryA
DeviceIoControl
SetErrorMode
SetUnhandledExceptionFilter
CreateMutexW
ReleaseMutex
MoveFileExW
FindNextFileW
FindFirstFileW
DeleteFileW
GetFileAttributesW
SetFileAttributesW
CreateFileW
CreateFileA
FindClose
ReadFile
WriteFile
GetFileSize
GetCurrentProcess
WaitForSingleObject
CreateDirectoryW
GetTempPathW
GetEnvironmentVariableW
GetTickCount
InitializeCriticalSection
MoveFileW
WideCharToMultiByte
VirtualQuery
LoadLibraryW
LoadLibraryExW
lstrcmpiW
InterlockedIncrement
MultiByteToWideChar
LeaveCriticalSection
EnterCriticalSection
FreeLibrary
FreeResource
InterlockedDecrement
GetDriveTypeW
FindResourceExW
CreateThread
GetModuleFileNameW
GetCommandLineW
GetCurrentThreadId
FindResourceW
LoadResource
LockResource
Sleep
SizeofResource
GetModuleFileNameA
DeleteCriticalSection
GetModuleHandleW
GetProcessHeap
GetCurrentProcessId
LocalFree
GetProcAddress
HeapDestroy
DecodePointer
HeapAlloc
RaiseException
CloseHandle
HeapReAlloc
Process32FirstW
Process32NextW
GetLastError
CreateToolhelp32Snapshot
GetLogicalDriveStringsW
HeapSize
OpenProcess
LocalAlloc
InitializeCriticalSectionAndSpinCount
VirtualAlloc
VirtualFree
CompareFileTime
GetSystemDirectoryW
SleepEx
GetCPInfo
GetLocaleInfoW
LCMapStringW
CompareStringW
EncodePointer
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SwitchToThread
CreateEventW
SetLastError
QueryPerformanceFrequency
QueryPerformanceCounter
HeapFree
IsValidLocale
IsDebuggerPresent
OutputDebugStringW
TryEnterCriticalSection
GetStringTypeW
QueryDosDeviceW
user32
RegisterClassExW
CreateWindowExW
DestroyWindow
SetTimer
KillTimer
GetCursor
GetUserObjectInformationW
GetProcessWindowStation
UpdateWindow
GetDC
ReleaseDC
MonitorFromPoint
IsWindow
SetWindowPos
IsWindowVisible
IsIconic
GetFocus
GetKeyState
SetCapture
ReleaseCapture
BeginPaint
EndPaint
GetUpdateRect
InvalidateRect
GetClientRect
GetWindowRect
GetCursorPos
ScreenToClient
MapWindowPoints
GetSysColor
IntersectRect
UnionRect
OffsetRect
IsRectEmpty
DefWindowProcW
PostMessageW
GetMessageW
PtInRect
GetWindowLongW
SetWindowLongW
GetParent
DispatchMessageW
PeekMessageW
CharNextW
TranslateMessage
MessageBoxW
GetWindow
LoadImageW
MonitorFromWindow
GetMonitorInfoW
SetCursor
InflateRect
LoadCursorW
SetWindowRgn
wsprintfW
SendMessageW
GetActiveWindow
CallWindowProcW
RegisterClassW
GetClassInfoExW
ShowWindow
EnableWindow
GetSystemMetrics
ActivateKeyboardLayout
PostQuitMessage
SetFocus
SetPropW
GetPropW
UpdateLayeredWindow
MoveWindow
GetWindowRgn
CharPrevW
IsZoomed
DrawTextW
FillRect
SetRect
CreatePopupMenu
EnableMenuItem
AppendMenuW
TrackPopupMenu
CreateCaret
GetCaretBlinkTime
DestroyMenu
HideCaret
DrawIconEx
DestroyIcon
PrivateExtractIconsW
MapVirtualKeyExW
GetKeyNameTextW
GetKeyboardLayout
SetForegroundWindow
GetGUIThreadInfo
InvalidateRgn
CreateAcceleratorTableW
DrawTextA
wsprintfA
GetWindowTextLengthW
GetWindowTextW
SetWindowTextW
EqualRect
IsWindowEnabled
ClientToScreen
GetCaretPos
SetCaretPos
ShowCaret
gdi32
CombineRgn
CreateDIBSection
PtInRegion
CreateRectRgn
CreateRoundRectRgn
SetWindowOrgEx
GetObjectW
GetTextMetricsW
PlayEnhMetaFile
GetEnhMetaFileHeader
CreateEnhMetaFileW
CloseEnhMetaFile
SelectObject
SaveDC
CreatePenIndirect
Rectangle
RemoveFontMemResourceEx
AddFontMemResourceEx
GetStockObject
DeleteObject
DeleteDC
CreatePen
CreateFontIndirectW
CreateDIBitmap
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
GetDeviceCaps
SetBitmapBits
CreateRectRgnIndirect
CreateSolidBrush
GetCharABCWidthsW
GetClipBox
GetTextExtentPoint32W
LineTo
SelectClipRgn
ExtSelectClipRgn
SetBkColor
SetBkMode
GetBitmapBits
SetStretchBltMode
SetTextColor
GetObjectA
MoveToEx
TextOutW
GdiFlush
CreatePatternBrush
RestoreDC
GetTextExtentPointA
StretchBlt
advapi32
CryptDestroyKey
CryptSetHashParam
CryptSignHashW
CryptEnumProvidersW
CryptGenRandom
CryptCreateHash
CryptReleaseContext
CryptAcquireContextW
ReportEventW
RegisterEventSourceW
DeregisterEventSource
CryptDecrypt
CryptExportKey
FreeSid
AllocateAndInitializeSid
LookupAccountSidW
GetTokenInformation
RegQueryValueExW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetEntriesInAclW
OpenProcessToken
GetUserNameW
RegCloseKey
RegQueryInfoKeyW
RegDeleteKeyW
RegCreateKeyExW
RegEnumKeyExW
RegDeleteValueW
RegSetValueExW
RegOpenKeyExW
CryptGetProvParam
CryptGetUserKey
CryptDestroyHash
shell32
SHBrowseForFolderW
ShellExecuteW
SHGetFolderPathW
SHGetFileInfoW
SHGetPathFromIDListW
CommandLineToArgvW
DragQueryFileW
ShellExecuteExW
ole32
CoUninitialize
CoTaskMemFree
CoTaskMemAlloc
OleLockRunning
CLSIDFromProgID
CLSIDFromString
CreateStreamOnHGlobal
ReleaseStgMedium
OleDuplicateData
DoDragDrop
CoTaskMemRealloc
CoCreateInstance
CoInitialize
oleaut32
SysAllocString
VarUI4FromStr
SysFreeString
VariantInit
VariantClear
shlwapi
PathFindFileNameW
PathFileExistsW
PathRemoveFileSpecW
PathRemoveExtensionW
SHDeleteKeyW
PathCombineW
PathIsDirectoryW
comctl32
InitCommonControlsEx
_TrackMouseEvent
ord17
gdiplus
GdipLoadImageFromStream
GdipLoadImageFromStreamICM
GdipCloneImage
GdipDisposeImage
GdipCreateFromHDC
GdipDeleteGraphics
GdipDeletePen
GdipSetTextRenderingHint
GdipSetInterpolationMode
GdipDrawRectangleI
GdipDrawPath
GdipFillRectangleI
GdipFillPath
GdipCreateFontFromDC
GdipCreatePen1
GdipCreateSolidFill
GdipSetPenMode
GdipSetSmoothingMode
GdipGetPropertyItem
GdiplusStartup
GdiplusShutdown
GdipAlloc
GdipFree
GdipCreatePath
GdipDeletePath
GdipAddPathLine
ord1
GdipCloneBrush
GdipCreateFontFromLogfontA
GdipRotateWorldTransform
GdipTranslateWorldTransform
GdipDrawImageRectI
GdipDeleteBrush
GdipGetPropertyItemSize
GdipImageSelectActiveFrame
GdipImageGetFrameCount
GdipImageGetFrameDimensionsList
GdipImageGetFrameDimensionsCount
GdipGetImageHeight
GdipGetImageWidth
GdipSetStringFormatTrimming
GdipSetStringFormatLineAlign
GdipSetStringFormatAlign
GdipSetStringFormatFlags
GdipCloneStringFormat
GdipDeleteStringFormat
GdipStringFormatGetGenericTypographic
GdipMeasureString
GdipDrawString
GdipDeleteFont
imm32
ImmSetCompositionWindow
ImmGetContext
ImmReleaseContext
crypt32
CertGetCertificateContextProperty
CertDuplicateCertificateContext
CertOpenStore
CertFindCertificateInStore
CryptMsgGetParam
CertCloseStore
CertOpenSystemStoreW
CertGetIntendedKeyUsage
CertGetEnhancedKeyUsage
CertEnumCertificatesInStore
CryptQueryObject
CertGetNameStringW
CryptMsgClose
CertFreeCertificateContext
ws2_32
getsockopt
getsockname
getpeername
htons
recvfrom
sendto
WSAStartup
gethostname
gethostbyname
ntohs
shutdown
setsockopt
socket
WSASetLastError
WSAEnumNetworkEvents
WSACreateEvent
WSACloseEvent
freeaddrinfo
getaddrinfo
select
__WSAFDIsSet
ioctlsocket
listen
htonl
accept
WSAEventSelect
WSAIoctl
getnameinfo
WSACleanup
closesocket
recv
send
WSAGetLastError
bind
connect
psapi
GetProcessImageFileNameW
GetModuleFileNameExW
EnumProcessModules
EnumProcesses
dbghelp
MiniDumpWriteDump
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
urlmon
ObtainUserAgentString
wldap32
ord147
ord133
ord79
ord142
ord167
ord127
ord27
ord26
ord117
ord41
ord208
ord216
ord14
ord46
ord301
ord219
ord145
Sections
.text Size: 2.2MB - Virtual size: 2.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 563KB - Virtual size: 563KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 48KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4.9MB - Virtual size: 4.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 107KB - Virtual size: 107KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ