Static task
static1
Behavioral task
behavioral1
Sample
ab483a841cd74874d78aee4ac012bc59a631a9d498e557cd77f45f22136bbe5c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ab483a841cd74874d78aee4ac012bc59a631a9d498e557cd77f45f22136bbe5c.exe
Resource
win10v2004-20220901-en
General
-
Target
ab483a841cd74874d78aee4ac012bc59a631a9d498e557cd77f45f22136bbe5c
-
Size
1.1MB
-
MD5
50ff5cae4492c64030c4ec8ddd33c83d
-
SHA1
385e96ec3215eccac3aa027849ce5a87ef798ad1
-
SHA256
ab483a841cd74874d78aee4ac012bc59a631a9d498e557cd77f45f22136bbe5c
-
SHA512
95092d7753418a285573cce34ae4e122efe6a79386316360743d0564a84ed93d18ff4d7b6e4acb83996f730559ea3d42f8d8b5a54284318f953e85d549703908
-
SSDEEP
12288:nyogXdsRdp431wDb5iiLuunxzWVbhIyCfbPbZi0rRFSX:9gXdsRdp463ybhI7fbPbZhr
Malware Config
Signatures
Files
-
ab483a841cd74874d78aee4ac012bc59a631a9d498e557cd77f45f22136bbe5c.exe windows x86
2d2eb36c8f642985e68183d727c6d489
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateDirectoryA
GetFileAttributesA
GetLastError
SetLastError
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
Sleep
FindResourceExW
GetProcAddress
LoadResource
LockResource
SizeofResource
FindResourceW
LoadLibraryA
MultiByteToWideChar
WideCharToMultiByte
DecodePointer
RaiseException
InitializeCriticalSectionEx
DeleteCriticalSection
ReadConsoleW
ReadFile
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
SetFilePointerEx
GetFileSizeEx
GetStringTypeW
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
HeapQueryInformation
IsDebuggerPresent
OutputDebugStringW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
CreateEventW
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetTickCount
GetModuleHandleW
GetCurrentThreadId
CloseHandle
SetEvent
ResetEvent
WaitForSingleObjectEx
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
InitializeSListHead
GetCurrentProcess
TerminateProcess
RtlUnwind
InterlockedPushEntrySList
InterlockedFlushSList
EncodePointer
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
HeapValidate
GetSystemInfo
GetStdHandle
WriteFile
GetCurrentThread
GetFileType
WriteConsoleW
SetConsoleCtrlHandler
GetTempPathW
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
MoveFileExW
CreateFileW
user32
LoadIconA
LoadCursorA
EndPaint
BeginPaint
UpdateWindow
TranslateAcceleratorA
LoadAcceleratorsA
EndDialog
DialogBoxParamA
UnregisterClassA
DestroyWindow
CreateWindowExA
RegisterClassExA
PostQuitMessage
DefWindowProcA
DispatchMessageA
TranslateMessage
GetMessageA
LoadStringA
ShowWindow
Sections
.textbss Size: - Virtual size: 371KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 809KB - Virtual size: 809KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 173KB - Virtual size: 173KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.msvcjmc Size: 512B - Virtual size: 425B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 1024B - Virtual size: 777B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.00cfg Size: 512B - Virtual size: 260B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 58KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ