Static task
static1
Behavioral task
behavioral1
Sample
bab13afaf4d13f96d4d61ff9acac205a3fd3def0f0cb0a177b94cc11276e0013.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bab13afaf4d13f96d4d61ff9acac205a3fd3def0f0cb0a177b94cc11276e0013.exe
Resource
win10v2004-20220812-en
General
-
Target
bab13afaf4d13f96d4d61ff9acac205a3fd3def0f0cb0a177b94cc11276e0013
-
Size
388KB
-
MD5
6622b5864f71406065f7610c45caed2c
-
SHA1
9eba4f82b74860b620a1da37a71e9e5aeed17af0
-
SHA256
bab13afaf4d13f96d4d61ff9acac205a3fd3def0f0cb0a177b94cc11276e0013
-
SHA512
c24818308065482883774e89b12961821149a3427a5951ad9ae626d5b03edd3700dcaccff28d4b290646833b0d0bc80d09c88d08e3a842c9c34c6af1fb44e2ca
-
SSDEEP
6144:3QBMaM+qdnAWw3D4oteAUyojZ8aMxK/uO8KAlkDSL1ok2:q/MHOD4otXe18aUMuO02Dk1
Malware Config
Signatures
Files
-
bab13afaf4d13f96d4d61ff9acac205a3fd3def0f0cb0a177b94cc11276e0013.exe windows x86
95f0dd28114605daf943e3d4751cf931
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CopyFileA
ExitProcess
GetTempPathA
VirtualAllocEx
LoadLibraryW
CreateSemaphoreA
FreeLibrary
VirtualFreeEx
SetLastError
CreateMutexA
GetModuleHandleA
GetTickCount
ReadFile
CreateFileA
LocalAlloc
GlobalFree
WriteFile
GlobalAlloc
UnlockFile
LockFile
SetFilePointer
LoadLibraryA
CreateEventA
SystemTimeToFileTime
GetSystemTime
FindClose
FindNextFileA
GetSystemDirectoryA
LCMapStringW
LCMapStringA
MultiByteToWideChar
GetOEMCP
GetACP
GetCPInfo
HeapReAlloc
RtlUnwind
HeapCreate
HeapDestroy
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
GetStringTypeW
FreeEnvironmentStringsA
GetModuleFileNameA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
HeapFree
HeapAlloc
GetVersion
GetCommandLineA
GetStartupInfoA
GetCurrentDirectoryA
SetCurrentDirectoryA
CloseHandle
GetProcAddress
GetModuleHandleW
VirtualAlloc
GetLastError
Sleep
VirtualFree
VirtualProtect
GetStringTypeA
FindResourceExA
user32
GetDesktopWindow
DispatchMessageA
TranslateMessage
IsWindow
IsWindowVisible
SetWindowRgn
CopyImage
DestroyIcon
CreateIconIndirect
EndDialog
DialogBoxParamA
DestroyWindow
DefWindowProcA
GetClientRect
DrawTextA
EndPaint
PostQuitMessage
CreateWindowExA
ShowWindow
UpdateWindow
LoadIconA
LoadCursorA
RegisterClassExA
LoadStringA
DrawIcon
LoadAcceleratorsA
GetMessageA
TranslateAcceleratorA
GetDC
HideCaret
ShowCaret
ReleaseDC
BeginPaint
gdi32
GetObjectA
CreateDCA
CreatePen
CreateSolidBrush
SelectObject
Rectangle
DeleteObject
GetDIBits
CreateCompatibleBitmap
GetDeviceCaps
EnumObjects
shell32
StrStrIA
Sections
.text Size: 176KB - Virtual size: 172KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dbg Size: 165KB - Virtual size: 545KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ssl Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE