Static task
static1
Behavioral task
behavioral1
Sample
4ab4b82583b0293f1e7773015958d119820907915d4df882316f9cef0c6022b6.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
4ab4b82583b0293f1e7773015958d119820907915d4df882316f9cef0c6022b6.exe
Resource
win10v2004-20220414-en
General
-
Target
4ab4b82583b0293f1e7773015958d119820907915d4df882316f9cef0c6022b6
-
Size
419KB
-
MD5
52d3ab3e5431244512b9777cf9c43e6f
-
SHA1
8b4c82d5e39e0f826f3c8e8377aa3f4e9a5b515a
-
SHA256
4ab4b82583b0293f1e7773015958d119820907915d4df882316f9cef0c6022b6
-
SHA512
18d78bffb7add66d489f2cc8ad3409ef232271dcfd40efae902df44e1853f4225ecdc35f54f196ede90656b3066ba9c72a6e3d0bddb1445fd08f6468d4b4f065
-
SSDEEP
6144:zY9L6Wf4O2NtMUGTbPXoR5s5YY9+9i2UU3IcjrP7lxMJYHanWMXGyi6lZ866c2dP:M404O2fMUEbYs5rA4rupX6bXhi6WyDzK
Malware Config
Signatures
Files
-
4ab4b82583b0293f1e7773015958d119820907915d4df882316f9cef0c6022b6.exe windows x86
127d3d5aad0728235b49954dce3769f3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
__setusermatherr
_adjust_fdiv
__p__commode
_initterm
__set_app_type
_except_handler3
_controlfp
__getmainargs
_acmdln
exit
__p__fmode
_errno
_ctype
_dup
_onexit
__dllonexit
_callnewh
mpr
WNetAddConnection2A
WNetCancelConnection2A
WNetGetProviderNameA
version
VerInstallFileA
GetFileVersionInfoA
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueA
advapi32
OpenThreadToken
SetEntriesInAclW
MakeAbsoluteSD
LookupPrivilegeValueW
LsaQueryInformationPolicy
SetServiceStatus
ImpersonateSelf
GetSecurityDescriptorSacl
ImpersonateLoggedOnUser
GetTokenInformation
SetSecurityDescriptorGroup
CreateProcessAsUserA
DuplicateToken
LookupPrivilegeValueA
RegEnumKeyExA
LookupAccountNameW
GetFileSecurityW
RegOpenKeyExW
RevertToSelf
InitializeSid
RegisterEventSourceA
DecryptFileW
RegSetKeySecurity
RegCloseKey
RegSetValueA
GetUserNameA
GetSidLengthRequired
AddAce
RegRestoreKeyW
ReportEventA
FreeSid
RegNotifyChangeKeyValue
OpenSCManagerA
ChangeServiceConfig2A
RegEnumKeyW
EnumDependentServicesA
GetSidSubAuthority
RegOpenKeyExA
ChangeServiceConfig2W
LockServiceDatabase
RegCreateKeyA
OpenServiceA
GetSidSubAuthorityCount
CreateServiceW
GetKernelObjectSecurity
StartServiceA
SetNamedSecurityInfoW
OpenProcessToken
RegCreateKeyW
RegDeleteKeyA
user32
InSendMessage
SendMessageA
DefFrameProcW
GetLastActivePopup
ToAscii
GetScrollInfo
AttachThreadInput
ValidateRect
SetMenu
CharLowerA
DispatchMessageW
GetFocus
IsDlgButtonChecked
CharNextA
InsertMenuW
PostQuitMessage
BlockInput
SetMenuDefaultItem
VkKeyScanW
RegisterClassExW
TrackPopupMenu
GetMenuState
CloseWindow
SetClassLongW
GetKeyboardState
IsCharAlphaNumericA
GetDC
TranslateMDISysAccel
OemToCharBuffA
CreateDialogIndirectParamA
GetClassInfoExW
PostMessageW
GetDlgItem
SendDlgItemMessageW
IsClipboardFormatAvailable
LoadAcceleratorsA
GetClassLongA
CharPrevW
GetMenuItemID
CopyIcon
FindWindowExA
GetClipboardFormatNameW
kernel32
GetStartupInfoA
GetModuleHandleA
GetNamedPipeHandleStateW
FoldStringW
Sections
.text Size: 96KB - Virtual size: 95KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 64KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 546KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ