Static task
static1
Behavioral task
behavioral1
Sample
59ca44bb3f1d0bc4cacc12be2c8dc731557b0bc390165865f68e2e897b6b411a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
59ca44bb3f1d0bc4cacc12be2c8dc731557b0bc390165865f68e2e897b6b411a.exe
Resource
win10v2004-20220812-en
General
-
Target
59ca44bb3f1d0bc4cacc12be2c8dc731557b0bc390165865f68e2e897b6b411a
-
Size
92KB
-
MD5
91ab7df57bce0659c41a0fad7a06221a
-
SHA1
6e62165642189f4b8e7998a9767d663f93d7c14d
-
SHA256
59ca44bb3f1d0bc4cacc12be2c8dc731557b0bc390165865f68e2e897b6b411a
-
SHA512
807d163b8eaa6c8485277469916c7dc60e6ba2cf9108cd81436cd5b6e85e7d529da71a17e11ea5ff8ce918204553691bdd168904c96f1a02f8995ce38077760a
-
SSDEEP
1536:dAbA3emO/nWdsJE2pchRAW6Qijc7zyrwDFH4O9Yp8oUNk:SbAm/A/3DAW6Hg7zyM2SHN
Malware Config
Signatures
Files
-
59ca44bb3f1d0bc4cacc12be2c8dc731557b0bc390165865f68e2e897b6b411a.exe windows x86
3e2c7b0054d1cac2d4bd26f39d134251
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetLastError
DeleteFileA
RemoveDirectoryW
VirtualProtectEx
GetStdHandle
CreateDirectoryW
HeapSize
HeapDestroy
CreateFileMappingW
OpenEventW
ReleaseMutex
GetFileSize
SetLastError
GetVersion
ReleaseSemaphore
RemoveDirectoryW
CreateFileA
lstrlenA
GetCommandLineW
LoadLibraryA
Sleep
GetStartupInfoA
CreateMutexA
WriteConsoleW
CreatePipe
user32
GetSysColor
IsZoomed
PeekMessageA
GetClassInfoA
DispatchMessageA
DestroyMenu
MessageBoxA
FindWindowA
DestroyMenu
IsWindow
CreateIcon
DrawTextW
GetWindowLongA
feclient
FeClientInitialize
FeClientInitialize
FeClientInitialize
FeClientInitialize
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 85KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE