Static task
static1
Behavioral task
behavioral1
Sample
dbabe4d1fef808fabffbaa47b139242c2630e42acfceba77dd9172836f73204c.exe
Resource
win10-20220812-en
General
-
Target
dbabe4d1fef808fabffbaa47b139242c2630e42acfceba77dd9172836f73204c
-
Size
798KB
-
MD5
7bda6dd8e9850ea3613461d45bfd6657
-
SHA1
d4b94890b3f6a0dddaed143aa5c257637cce1be2
-
SHA256
dbabe4d1fef808fabffbaa47b139242c2630e42acfceba77dd9172836f73204c
-
SHA512
a687a3d988a7f8c8da35655167c86111a53ba9ad4637180344157017f68dd42c1ac647dd72b3a4846154c350dc1576f3c7beba6cb7c5258e5471ddbc574faf5e
-
SSDEEP
24576:Xx4+icv70Z5TkOGXDvWWwbb1E4QzVrCQyLitT:YNZ+zOXE/zyAT
Malware Config
Signatures
Files
-
dbabe4d1fef808fabffbaa47b139242c2630e42acfceba77dd9172836f73204c.exe windows x86
b6bedcb856f1ec78742547ac6d88521a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProfileSectionW
VerifyVersionInfoA
LocalFree
GetProcessPriorityBoost
FindFirstChangeNotificationW
GlobalGetAtomNameA
FindResourceExW
GetComputerNameExW
GetModuleHandleW
GetTempPathA
BuildCommDCBAndTimeoutsA
GetProcAddress
GetModuleHandleA
VirtualUnlock
GetTapeParameters
LockFile
GetAtomNameA
SetConsoleScreenBufferSize
SetProcessAffinityMask
EnumResourceLanguagesW
GetCPInfoExA
SetThreadContext
lstrlenA
GetProcessAffinityMask
SetConsoleCtrlHandler
GlobalGetAtomNameW
SetInformationJobObject
lstrcpynA
WriteConsoleA
MoveFileWithProgressA
GetBinaryTypeA
GetLastError
GetCommandLineA
GetCalendarInfoA
GetConsoleTitleA
SearchPathA
CreateActCtxA
FormatMessageA
InitializeCriticalSection
FindNextVolumeA
GetCurrentConsoleFont
LoadLibraryA
GetConsoleAliasW
LoadLibraryW
ExitProcess
MoveFileWithProgressW
LeaveCriticalSection
EnumSystemLocalesW
OpenMutexA
FileTimeToLocalFileTime
SearchPathW
GetProcessShutdownParameters
FindResourceA
FormatMessageW
CreateIoCompletionPort
GetPrivateProfileStructW
CreateFiber
InterlockedExchange
EnumDateFormatsA
FindResourceExA
InterlockedIncrement
FindActCtxSectionGuid
SetConsoleCursorInfo
UnregisterWait
FoldStringW
LocalAlloc
GetFileType
GetNumberOfConsoleInputEvents
GetProfileSectionA
SetDefaultCommConfigW
SetLastError
GetMailslotInfo
GetSystemDefaultUILanguage
GetFileAttributesA
GetSystemWindowsDirectoryA
GetAtomNameW
GetComputerNameA
ReadConsoleInputA
EnumTimeFormatsA
GetPrivateProfileStructA
_hwrite
GetConsoleAliasA
lstrcatA
GetFullPathNameW
DebugSetProcessKillOnExit
AddAtomA
SetCurrentDirectoryW
SetCalendarInfoA
CopyFileExA
HeapAlloc
FindNextChangeNotification
DeleteFileA
RaiseException
GetStartupInfoW
HeapValidate
IsBadReadPtr
DeleteCriticalSection
EnterCriticalSection
GetModuleFileNameW
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
InterlockedDecrement
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetStdHandle
GetStartupInfoA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
HeapDestroy
HeapCreate
HeapFree
VirtualFree
GetModuleFileNameA
WriteFile
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
HeapSize
HeapReAlloc
VirtualAlloc
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
RtlUnwind
InitializeCriticalSectionAndSpinCount
DebugBreak
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
WideCharToMultiByte
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetFilePointer
GetConsoleCP
GetConsoleMode
SetStdHandle
GetConsoleOutputCP
CreateFileA
CloseHandle
FlushFileBuffers
user32
CharUpperW
gdi32
GetCharWidthW
SelectObject
Sections
.text Size: 177KB - Virtual size: 176KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 587KB - Virtual size: 1.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.togunal Size: 512B - Virtual size: 5B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tamoh Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ