Static task
static1
Behavioral task
behavioral1
Sample
59362a70f63a4559c824c39907110e8e2ae5f6ae343f343c2b1a23a7b9b563e1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
59362a70f63a4559c824c39907110e8e2ae5f6ae343f343c2b1a23a7b9b563e1.exe
Resource
win10v2004-20220812-en
General
-
Target
59362a70f63a4559c824c39907110e8e2ae5f6ae343f343c2b1a23a7b9b563e1
-
Size
804KB
-
MD5
8fbf98907beb33cf706c20cf04d2a655
-
SHA1
1c2bf874579bfb12917b7c852e39fea2e5de40a5
-
SHA256
59362a70f63a4559c824c39907110e8e2ae5f6ae343f343c2b1a23a7b9b563e1
-
SHA512
874cea9a365ff3c9eb3d6d445d467627ebe07acf97fe55caa6a0ec8e050acb4512a04a1a6453fcca243d39fbaa4bf08e57f77c7fd6cb9da39513d0682529bc42
-
SSDEEP
12288:FUS+2RXmM/vsl9DINqTUecSCmVb1iwmEj6wqEzdp+zkvdQQI:FUd28M/k3IhS9B1J6DEzdwidQQI
Malware Config
Signatures
Files
-
59362a70f63a4559c824c39907110e8e2ae5f6ae343f343c2b1a23a7b9b563e1.exe windows x86
e16f361efeffc47f0d26f588168e7bbe
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetWindowLongA
InvalidateRect
SendInput
DdeGetLastError
OemKeyScan
DestroyWindow
UnregisterClassA
GetInputDesktop
SetMenuItemInfoW
CharUpperBuffW
ChildWindowFromPoint
CloseWindow
SetPropA
LockWindowUpdate
FrameRect
CloseDesktop
CharLowerBuffW
RegisterClassExA
ShowWindow
FreeDDElParam
RegisterClassA
MessageBoxA
GetGUIThreadInfo
GetMonitorInfoW
GetCursorPos
GetFocus
GetUpdateRect
GetKeyboardLayoutNameW
EndDeferWindowPos
RegisterClassW
EnumDisplayDevicesA
SetProcessWindowStation
CreateWindowExW
CharUpperW
DefWindowProcA
EqualRect
IsCharLowerW
TranslateMessage
DestroyAcceleratorTable
SendNotifyMessageW
advapi32
LookupPrivilegeNameA
CryptSetProviderW
RegQueryMultipleValuesA
CryptHashData
CryptSetHashParam
RegEnumValueW
LookupPrivilegeDisplayNameW
CryptGetDefaultProviderA
LookupSecurityDescriptorPartsA
ReportEventA
RegDeleteValueA
RegReplaceKeyW
RegSetValueExA
RegOpenKeyA
CryptGetUserKey
CryptContextAddRef
DuplicateToken
RegQueryInfoKeyW
ReportEventW
CryptSignHashW
RevertToSelf
CryptSetProviderExW
CryptSetProviderExA
AbortSystemShutdownW
RegRestoreKeyA
comctl32
InitCommonControlsEx
CreateMappedBitmap
DrawStatusTextA
kernel32
TerminateProcess
ExitProcess
GetModuleHandleA
GetCommandLineA
OpenMutexA
HeapValidate
GetCurrentThreadId
GetShortPathNameA
GetSystemTime
TlsSetValue
HeapFree
IsBadWritePtr
GetSystemTimeAsFileTime
TlsAlloc
OutputDebugStringA
SetFilePointer
GetModuleFileNameA
GetProcAddress
GetLocalTime
TlsFree
HeapDestroy
GetCPInfo
CompareStringW
SetConsoleCtrlHandler
VirtualFree
FlushFileBuffers
OpenEventW
IsBadReadPtr
LCMapStringW
InitializeCriticalSection
GetLastError
GetFileType
GetEnvironmentStrings
GetCurrentProcess
CloseHandle
DeleteCriticalSection
LCMapStringA
VirtualAlloc
HeapReAlloc
ReadFile
InterlockedDecrement
TlsGetValue
GetStringTypeW
WideCharToMultiByte
GetEnvironmentStringsW
InterlockedIncrement
GetCurrentThread
GetCurrentProcessId
GetACP
EnterCriticalSection
UnhandledExceptionFilter
QueryPerformanceCounter
MultiByteToWideChar
GetVersion
FreeEnvironmentStringsW
SetHandleCount
SetEnvironmentVariableA
LocalSize
RtlUnwind
DebugBreak
VirtualQuery
InterlockedExchange
FreeEnvironmentStringsA
GetStdHandle
HeapCreate
LeaveCriticalSection
GetTickCount
GetStringTypeA
WriteFile
SetLastError
CompareStringA
HeapAlloc
CreateMutexA
WriteFileEx
GetStartupInfoA
GetOEMCP
LoadLibraryA
GetTimeZoneInformation
SetStdHandle
Sections
.text Size: 204KB - Virtual size: 200KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 400KB - Virtual size: 396KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 140KB - Virtual size: 137KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ