Static task
static1
Behavioral task
behavioral1
Sample
58d800b4fbdbbeeefc951f25d92393671336e81a16d437086c1ee2370a0d3a34.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
58d800b4fbdbbeeefc951f25d92393671336e81a16d437086c1ee2370a0d3a34.exe
Resource
win10v2004-20221111-en
General
-
Target
58d800b4fbdbbeeefc951f25d92393671336e81a16d437086c1ee2370a0d3a34
-
Size
480KB
-
MD5
ebf321b7261b25749be28c4533850cea
-
SHA1
d35040f46a96e1fddc7bd6bcd2f930693bf19027
-
SHA256
58d800b4fbdbbeeefc951f25d92393671336e81a16d437086c1ee2370a0d3a34
-
SHA512
ae61e12d4ff369639a5485db8b7def79a9d2ca81f406ed87847bfc1cfdfafe2c7a6cd646f71560dda50c6119fa180e9c9cc504e9d7159b03e01dc056712f32d3
-
SSDEEP
6144:rv4WKkSZrb6W/jFzZvG13wB4C9KPCxeUR0rou0aoow+vX+rfQKn+fLt:s8SZfjF9e13wOCjZJu+owuwfQKC
Malware Config
Signatures
Files
-
58d800b4fbdbbeeefc951f25d92393671336e81a16d437086c1ee2370a0d3a34.exe windows x86
bc10d0cbec66b4c1dd16105a9bb99607
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalFlags
GetCPInfo
GetOEMCP
SetErrorMode
FileTimeToLocalFileTime
GetFileAttributesA
GetFileTime
GetSystemTimeAsFileTime
HeapAlloc
HeapFree
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapReAlloc
GetCommandLineA
GetProcessHeap
GetStartupInfoA
RtlUnwind
RaiseException
ExitProcess
HeapSize
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
SetHandleCount
GetFileType
GetACP
VirtualFree
HeapDestroy
HeapCreate
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
InterlockedIncrement
FileTimeToSystemTime
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
GetCurrentProcess
DuplicateHandle
GetThreadLocale
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
GetVersionExA
GetModuleFileNameW
GlobalAddAtomA
WritePrivateProfileStringA
FreeResource
GetTickCount
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
GlobalDeleteAtom
GetModuleHandleA
GlobalAlloc
MulDiv
GetCurrentProcessId
SetLastError
FormatMessageA
ClearCommError
ReadFile
PurgeComm
SetCommState
GetCommState
SetCommTimeouts
SetupComm
GetVersion
CompareStringA
InterlockedExchange
CompareStringW
GetPrivateProfileIntA
GetPrivateProfileStringA
GetModuleFileNameA
CloseHandle
WriteFile
CreateFileA
GlobalFree
GlobalUnlock
GlobalLock
FreeLibrary
Sleep
GetLastError
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
LocalFree
GetLocalTime
FindResourceA
LoadResource
LockResource
SizeofResource
InterlockedDecrement
GetProcAddress
GetStdHandle
LoadLibraryA
user32
DestroyMenu
CopyAcceleratorTableA
CharNextA
PostThreadMessageA
ReleaseCapture
SetCapture
LoadCursorA
GetSysColorBrush
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetTopWindow
GetMessagePos
MapWindowPoints
SetForegroundWindow
UpdateWindow
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
EqualRect
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetWindowTextLengthA
GetWindowTextA
SetFocus
UnhookWindowsHookEx
SetCursor
SetWindowsHookExA
CallNextHookEx
LoadIconA
GetSystemMetrics
IsIconic
SendMessageA
GetClientRect
DrawIcon
GetMessageA
TranslateMessage
DispatchMessageA
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
ModifyMenuA
UnregisterClassA
MessageBeep
EnableMenuItem
CheckMenuItem
GetNextDlgGroupItem
InvalidateRgn
InvalidateRect
SetRect
GetMessageTime
IsRectEmpty
KillTimer
SetTimer
EnableWindow
CharUpperA
MessageBoxA
IsWindowEnabled
GetLastActivePopup
GetWindowLongA
GetParent
GetWindowThreadProcessId
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
PostMessageA
PostQuitMessage
RegisterClipboardFormatA
SetWindowPos
MapDialogRect
SetWindowContextHelpId
GetWindow
EndDialog
GetNextDlgTabItem
GetDlgItem
IsWindow
DestroyWindow
CreateDialogIndirectParamA
SetActiveWindow
GetActiveWindow
GetDesktopWindow
GetForegroundWindow
gdi32
ExtSelectClipRgn
GetStockObject
GetTextColor
CreateRectRgnIndirect
GetRgnBox
GetMapMode
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
GetBkColor
DeleteDC
TextOutA
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
DeleteObject
SetMapMode
RestoreDC
SaveDC
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
GetDeviceCaps
ExtTextOutA
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegSetValueExA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegOpenKeyA
comctl32
InitCommonControlsEx
shlwapi
PathFindFileNameA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
oledlg
ord8
ole32
OleIsCurrentClipboard
CoRevokeClassObject
CoGetClassObject
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CoTaskMemAlloc
OleFlushClipboard
CoTaskMemFree
CLSIDFromProgID
CLSIDFromString
StgOpenStorageOnILockBytes
CoRegisterMessageFilter
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
oleaut32
SysAllocStringByteLen
VariantClear
VariantChangeType
VariantTimeToSystemTime
VariantInit
VariantCopy
SysStringLen
SysAllocStringLen
SafeArrayDestroy
SystemTimeToVariantTime
OleCreateFontIndirect
SysAllocString
SysFreeString
Sections
.text Size: 224KB - Virtual size: 222KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 56KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rmnet Size: 156KB - Virtual size: 156KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE