Static task
static1
Behavioral task
behavioral1
Sample
58601a4c4ec15a9c4f7173c07185940e2227c25d7538487d48db8d76493986ab.exe
Resource
win7-20221111-en
General
-
Target
58601a4c4ec15a9c4f7173c07185940e2227c25d7538487d48db8d76493986ab
-
Size
216KB
-
MD5
8282bfc8d684289e897628103926bb26
-
SHA1
1d56d54b7ab7adc6a0ec7ff9b4b0c8756c687fe6
-
SHA256
58601a4c4ec15a9c4f7173c07185940e2227c25d7538487d48db8d76493986ab
-
SHA512
1fe35d3037052481b81dd8e4c4f661626462755926d5908df46bf9d5f2626ad01883ea080273380fb40a7f1fd61cecf8d302e1cd738d920f97ae1108afc9e061
-
SSDEEP
3072:ouToNaEMhIsan6v1/t7/b6fmpvwOgNP3e1w5MryY8XK3Yce:wyon6jbwNPu1wBb
Malware Config
Signatures
Files
-
58601a4c4ec15a9c4f7173c07185940e2227c25d7538487d48db8d76493986ab.exe windows x86
ca8e28780666d8614eac2154cbf83f21
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ord17
kernel32
VirtualFree
FreeLibrary
GetProcAddress
LoadLibraryA
SetErrorMode
VirtualAlloc
WaitForSingleObject
CreateEventA
lstrlenA
WriteFile
ReadFile
SetFilePointer
GetLogicalDrives
QueryDosDeviceA
GetModuleFileNameA
LocalUnlock
MultiByteToWideChar
LocalFree
LocalLock
LocalAlloc
GetDriveTypeA
SetEnvironmentVariableA
CompareStringW
CompareStringA
FlushFileBuffers
HeapSize
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
GetVersionExA
GetLocaleInfoA
IsBadWritePtr
HeapReAlloc
InterlockedExchange
InitializeCriticalSection
VirtualQuery
GetSystemInfo
VirtualProtect
GetTimeZoneInformation
GetStringTypeW
GetStringTypeA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
HeapCreate
HeapDestroy
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
LCMapStringW
WideCharToMultiByte
LCMapStringA
UnhandledExceptionFilter
HeapAlloc
HeapFree
GetCurrentProcess
TerminateProcess
CloseHandle
GetLastError
Sleep
CreateFileA
DeviceIoControl
GetFileAttributesA
LeaveCriticalSection
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
FindFirstFileA
GetFileType
ExitThread
ResumeThread
CreateThread
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
ExitProcess
RtlUnwind
GetACP
GetOEMCP
GetCPInfo
TlsAlloc
SetLastError
GetCurrentThreadId
TlsFree
TlsSetValue
TlsGetValue
GetFullPathNameA
GetCurrentDirectoryA
SetEndOfFile
SetHandleCount
GetStdHandle
DeleteCriticalSection
SetStdHandle
EnterCriticalSection
user32
LoadCursorA
SystemParametersInfoA
GetDesktopWindow
MessageBeep
DrawTextA
GetDialogBaseUnits
DialogBoxIndirectParamA
EndDialog
IsWindow
WinHelpA
CheckDlgButton
SetFocus
GetSystemMenu
EnableMenuItem
SetWindowLongA
BeginPaint
DrawIcon
EndPaint
GetMessageA
TranslateMessage
DispatchMessageA
IsDialogMessageA
LoadIconA
DestroyWindow
RegisterClassA
CreateDialogParamA
RegisterWindowMessageA
DefWindowProcA
PostQuitMessage
PostMessageA
FindWindowA
GetWindowRect
GetSystemMetrics
MoveWindow
ShowWindow
wsprintfA
GetDlgItemTextA
MessageBoxA
LoadStringA
SetWindowTextA
SendDlgItemMessageA
SendMessageA
GetDlgItem
EnableWindow
SetDlgItemTextA
gdi32
CreateFontIndirectA
DeleteObject
CreateDCA
SelectObject
DeleteDC
comdlg32
GetOpenFileNameA
Sections
.text Size: 80KB - Virtual size: 79KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 116KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE