Static task
static1
Behavioral task
behavioral1
Sample
dab85b6af9a538fd8b3098db90741abf1f0ffc8aa3086d3c1e451424b642e823.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dab85b6af9a538fd8b3098db90741abf1f0ffc8aa3086d3c1e451424b642e823.exe
Resource
win10v2004-20220812-en
General
-
Target
dab85b6af9a538fd8b3098db90741abf1f0ffc8aa3086d3c1e451424b642e823
-
Size
332KB
-
MD5
5a4c85a0bcba903eb0b02bab8989dcb1
-
SHA1
3b0f2b1733d7cb3e218c5998983c9620953e7d54
-
SHA256
dab85b6af9a538fd8b3098db90741abf1f0ffc8aa3086d3c1e451424b642e823
-
SHA512
e3bda5f4a47cd5d419445490464d55dd0ec692c083c37513a474317980993e50fd3600e665f95dbab4b08c73d0b2385b540881b67f300032926effc628b32fc2
-
SSDEEP
6144:UXZL1yoPjBf9zTWZQiDjbWTIAozAtytXttZXm+7upQArp1fl:0DPpdSGTIJz3tNXmadkPfl
Malware Config
Signatures
Files
-
dab85b6af9a538fd8b3098db90741abf1f0ffc8aa3086d3c1e451424b642e823.exe windows x86
3182c593df2a606a109a924103102707
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42u
ord6376
ord4155
ord755
ord470
ord3087
ord537
ord6330
ord858
ord922
ord860
ord665
ord1971
ord6381
ord5180
ord6193
ord4470
ord1634
ord2858
ord2371
ord2567
ord6051
ord1768
ord4390
ord5286
ord3397
ord3569
ord567
ord1143
ord2634
ord2114
ord2294
ord2362
ord540
ord556
ord861
ord4229
ord324
ord3592
ord4419
ord4621
ord5273
ord2116
ord2438
ord5257
ord1720
ord5059
ord3744
ord6372
ord2047
ord2640
ord4435
ord4831
ord3793
ord5276
ord4347
ord6370
ord5157
ord2377
ord5237
ord4401
ord1767
ord4073
ord6048
ord4704
ord4992
ord4847
ord4370
ord5261
ord823
ord3658
ord2406
ord3621
ord3568
ord1165
ord825
ord800
ord609
ord809
ord641
ord1131
ord2613
ord2506
ord815
ord561
ord3733
ord4418
ord4616
ord4075
ord3074
ord3820
ord3826
ord3825
ord2971
ord3076
ord2980
ord3257
ord3131
ord4459
ord3254
ord3142
ord2977
ord5710
ord5285
ord5303
ord4667
ord4692
ord4074
ord2717
ord5298
ord5296
ord3341
ord2388
ord5193
ord1089
ord3917
ord5727
ord2504
ord2546
ord4480
ord6371
ord4269
ord354
ord1569
msvcrt
__CxxFrameHandler
fclose
fread
rewind
ftell
fseek
_wfopen
fopen
wcscat
rand
wcscmp
strlen
strncpy
free
malloc
memcpy
memset
strcpy
strncmp
realloc
_purecall
sin
cos
acos
_ftol
floor
calloc
_CxxThrowException
_except_handler3
_exit
_XcptFilter
exit
_wcmdln
__wgetmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
__dllonexit
_onexit
?terminate@@YAXXZ
??1type_info@@UAE@XZ
_controlfp
kernel32
GetModuleFileNameW
lstrcmpA
GetCurrentThreadId
GetProcAddress
GetModuleHandleA
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
lstrcpynA
SizeofResource
LockResource
LoadResource
FindResourceA
lstrcpyA
GetVersion
GetVersionExA
GetLastError
HeapAlloc
HeapFree
lstrlenA
MulDiv
VirtualProtect
FlushInstructionCache
GetCurrentProcess
SetLastError
GetModuleHandleW
GetProcessHeap
GetStartupInfoW
user32
DrawFrameControl
RedrawWindow
IsWindowEnabled
ValidateRect
DestroyIcon
DrawStateA
GetSystemMetrics
DrawIcon
DrawIconEx
GetWindowTextA
GetFocus
GetWindowPlacement
GetDC
GetSubMenu
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSysColorBrush
CopyRect
MapWindowPoints
OffsetRect
SetRect
FrameRect
InflateRect
WindowFromDC
GetMessagePos
SetCursor
IsWindowVisible
RemovePropA
SetCapture
ReleaseCapture
DestroyWindow
DrawEdge
DrawTextA
BeginPaint
EndPaint
PtInRect
ClientToScreen
SetForegroundWindow
InvalidateRect
UpdateWindow
GetActiveWindow
LoadCursorA
RegisterClassA
CreateWindowExA
SetPropA
GetPropA
ScreenToClient
CreatePopupMenu
AppendMenuA
GetCursorPos
DestroyMenu
GetMenuItemInfoA
FillRect
DispatchMessageA
GetMessageA
ShowScrollBar
SetScrollRange
SetScrollPos
SetScrollInfo
GetScrollRange
GetScrollPos
GetScrollInfo
EnableScrollBar
GetWindowInfo
GetWindow
IsIconic
IsZoomed
MoveWindow
ShowWindow
PostMessageA
SendMessageA
ReleaseDC
GetWindowDC
GetWindowRect
GetClientRect
IsRectEmpty
SetWindowRgn
SetWindowPos
GetWindowLongA
SetWindowLongA
CallWindowProcA
DefWindowProcA
IsWindow
SetWindowsHookExA
GetClassNameA
GetParent
CallNextHookEx
LoadIconW
EnableWindow
SendMessageW
KillTimer
SetTimer
GetSystemMenu
AppendMenuW
GetSysColor
gdi32
SetWindowOrgEx
PlayEnhMetaFile
SelectClipRgn
CreatePatternBrush
SetBrushOrgEx
PatBlt
UnrealizeObject
ExtTextOutA
IntersectClipRect
GetClipBox
ExcludeClipRect
SetStretchBltMode
StretchDIBits
RectVisible
StretchBlt
CreateDIBitmap
GetTextExtentPointA
CreateFontIndirectA
SetBkMode
CreatePen
MoveToEx
LineTo
ExtFloodFill
GetStockObject
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
CreateSolidBrush
DeleteObject
CombineRgn
OffsetRgn
CreateRectRgnIndirect
ExtCreateRegion
GetRegionData
CreateRectRgn
DeleteDC
GetDIBits
CreateICA
GetObjectA
SetTextColor
SetBkColor
CreateBitmap
BitBlt
RealizePalette
SelectPalette
GetDeviceCaps
comctl32
ImageList_GetIconSize
ImageList_Draw
ImageList_GetIcon
_TrackMouseEvent
InitCommonControlsEx
msvcp60
??0_Lockit@std@@QAE@XZ
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
??Mstd@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@0@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??1_Lockit@std@@QAE@XZ
Sections
.text Size: 132KB - Virtual size: 130KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 168KB - Virtual size: 167KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ