Static task
static1
Behavioral task
behavioral1
Sample
adb30ecb48493c268fc2c25d7f2eab44766c1627e7e14cdda6e992644d226c87.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
adb30ecb48493c268fc2c25d7f2eab44766c1627e7e14cdda6e992644d226c87.exe
Resource
win10v2004-20220812-en
General
-
Target
adb30ecb48493c268fc2c25d7f2eab44766c1627e7e14cdda6e992644d226c87
-
Size
192KB
-
MD5
0071845097e5e2c9fcf21ea85d338c30
-
SHA1
7e8c62c54719d73ed96d6b050608e407d521e2b6
-
SHA256
adb30ecb48493c268fc2c25d7f2eab44766c1627e7e14cdda6e992644d226c87
-
SHA512
f336656d6153c7c084d80c6b89ef8ce2a5e5770ccfdd755d92a23058b71415218a17479b112c43e66b8acbbf2ff763b15eedd50a19fa14cb279ca837f5ff074d
-
SSDEEP
3072:shu5saUjsmSiCrYggUR5IrwggOa43drafA45YW5v:sc53Uj/SiCr15jggO7tra4j2
Malware Config
Signatures
Files
-
adb30ecb48493c268fc2c25d7f2eab44766c1627e7e14cdda6e992644d226c87.exe windows x86
9b4ae205b7d57db664277131ec4bd159
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
i18n
?GetItem@CUResBundle@I18N@@QAE_NPBDAAV?$TUString@D@2@@Z
?_free_memory@I18N@@YAXPAX@Z
??0CUResBundle@I18N@@QAE@XZ
?Open@CUResBundle@I18N@@QAE_NPBD0ABULOCALE@2@@Z
??1CUResBundle@I18N@@QAE@XZ
mfc42
ord2985
ord3081
ord2976
ord3830
ord3831
ord3825
ord3079
ord3262
ord4622
ord4424
ord3738
ord815
ord561
ord924
ord537
ord2621
ord1134
ord1200
ord3136
ord4465
ord3259
ord3147
ord2982
ord5714
ord5289
ord1168
ord5307
ord4698
ord4079
ord2725
ord5302
ord5300
ord3346
ord2396
ord5199
ord1089
ord3922
ord5731
ord2512
ord2554
ord4486
ord6375
ord860
ord5683
ord4129
ord858
ord800
ord4274
ord4673
ord1175
ord823
ord825
ord1576
ord4080
msvcrt
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_onexit
__dllonexit
strncpy
wcstombs
_access
_mbschr
_mkdir
_snprintf
time
localtime
__p___argc
_mbsicmp
_mbsstr
strtok
__p___argv
_setmbcp
rand
_mbsrchr
_vsnprintf
_mbslwr
_mbsnbcat
_mbsnbcpy
__CxxFrameHandler
_stricmp
kernel32
GetPrivateProfileStringA
CloseHandle
Module32Next
Module32First
CreateToolhelp32Snapshot
InterlockedDecrement
GetLastError
GetProcAddress
GetModuleHandleA
OutputDebugStringA
GetCurrentProcessId
FreeLibrary
MultiByteToWideChar
SetEndOfFile
WriteFile
ReadFile
SetFilePointer
CreateFileA
FileTimeToSystemTime
FileTimeToLocalFileTime
GetProcessTimes
GetCurrentProcess
GetCurrentThreadId
GetStartupInfoA
InterlockedIncrement
CreateEventA
WaitForSingleObject
CreateThread
SetLastError
ConvertDefaultLocale
LoadLibraryA
GetModuleFileNameA
user32
MessageBoxA
PostMessageA
DefWindowProcA
UnregisterClassA
RegisterClassA
CreateWindowExA
SetWindowLongA
DestroyWindow
IsWindow
advapi32
RegSetValueExA
RegOpenKeyExA
RegEnumKeyExA
RegCloseKey
RegDeleteKeyA
RegCreateKeyExA
ole32
StringFromCLSID
CoTaskMemFree
CoInitialize
CoUninitialize
CLSIDFromString
CoDisconnectObject
CoRevokeClassObject
CoRegisterClassObject
gdiplus
GdiplusStartup
GdiplusShutdown
ws2_32
ntohl
htonl
Sections
.text Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 60KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
*_D Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE