Static task
static1
Behavioral task
behavioral1
Sample
abfeaebce045eed984827d27de3980e8fedc8da18bfa712b9f3c121e373f3bca.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
abfeaebce045eed984827d27de3980e8fedc8da18bfa712b9f3c121e373f3bca.exe
Resource
win10v2004-20220812-en
General
-
Target
abfeaebce045eed984827d27de3980e8fedc8da18bfa712b9f3c121e373f3bca
-
Size
300KB
-
MD5
dad63c95f80c482329ff0815dc80561b
-
SHA1
2ef337d27efef550e45d94c3339292c86b58d0f9
-
SHA256
abfeaebce045eed984827d27de3980e8fedc8da18bfa712b9f3c121e373f3bca
-
SHA512
42d61e768eb081c14bfc075609eb427a607c1c74156274ee69de1860d1a841093ddb89309093c92124ea3f06e3b1a222751a5d25784c3dbdeb8403915e540194
-
SSDEEP
3072:3zJmmHPq5ZkGknALYvVnHbcojzAg0FuAcQQ+taaNYSx32G9eiXtoMM7T:3zsvUnICAOAH4mT9eD7T
Malware Config
Signatures
Files
-
abfeaebce045eed984827d27de3980e8fedc8da18bfa712b9f3c121e373f3bca.exe windows x86
3162dc68056df451d8a56f9588deea99
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
IsCharUpperW
GetWindowRect
ShowOwnedPopups
DrawTextExA
GetMessageTime
GetMessagePos
GetUserObjectSecurity
SetDlgItemInt
ScreenToClient
FlashWindowEx
LoadAcceleratorsW
GetShellWindow
GetClipCursor
EnumDesktopWindows
InvalidateRect
SetMenu
GetUserObjectInformationW
SwitchDesktop
GetKeyboardLayout
CloseWindowStation
WaitForInputIdle
EnumThreadWindows
GetClassInfoExA
WindowFromPoint
ChildWindowFromPointEx
GetSysColorBrush
ShowScrollBar
SetPropW
DrawFrameControl
LoadImageA
RemoveMenu
SetDebugErrorLevel
OpenClipboard
wvsprintfA
CreateAcceleratorTableA
CreateIcon
MoveWindow
PostThreadMessageW
EnumPropsA
GetComboBoxInfo
PrivateExtractIconsW
LoadKeyboardLayoutW
RealGetWindowClassA
EnableScrollBar
GetMenuItemInfoA
EnumPropsExW
GetWindowPlacement
TranslateMessage
DefFrameProcW
ChildWindowFromPoint
LoadCursorA
RemovePropW
MapDialogRect
RegisterHotKey
SetCursorPos
IsCharUpperA
MonitorFromPoint
GetKeyboardLayoutNameW
CopyAcceleratorTableA
CharToOemBuffA
DialogBoxParamA
DefWindowProcA
SetCaretBlinkTime
PrintWindow
GetClassNameW
GetCursor
OffsetRect
RegisterWindowMessageA
FlashWindow
CharToOemA
SetWindowWord
RegisterDeviceNotificationW
ToUnicodeEx
DialogBoxIndirectParamW
LoadBitmapW
GetKeyboardType
DestroyWindow
LoadStringA
MessageBoxA
CharNextA
IsRectEmpty
SendNotifyMessageW
IsCharAlphaNumericA
ScrollWindowEx
GetOpenClipboardWindow
DdeGetData
CharLowerBuffW
GetWindowTextLengthA
wininet
InternetOpenW
InternetOpenUrlW
InternetReadFile
InternetCloseHandle
kernel32
GetProcAddress
SetEnvironmentVariableA
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetConsoleMode
GetConsoleCP
InitializeCriticalSectionAndSpinCount
LCMapStringW
LCMapStringA
QueryPerformanceCounter
HeapCreate
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
FreeEnvironmentStringsA
HeapReAlloc
HeapSize
GetStringTypeW
GetStringTypeA
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
HeapAlloc
GetTimeZoneInformation
HeapFree
TlsFree
TlsAlloc
GetModuleHandleW
IsValidCodePage
GetOEMCP
IsDebuggerPresent
SetUnhandledExceptionFilter
TerminateProcess
InterlockedDecrement
InterlockedIncrement
GetSystemTimeAsFileTime
GetTimeFormatA
ReadConsoleInputW
CreateJobObjectA
GetLargestConsoleWindowSize
EndUpdateResourceA
BackupRead
EnumDateFormatsW
CreateActCtxW
AttachConsole
CommConfigDialogA
GetCurrentActCtx
HeapQueryInformation
ReplaceFileA
GetProfileIntW
GlobalFix
GetLocaleInfoW
SearchPathA
EnumCalendarInfoW
SetFileApisToOEM
SetThreadContext
GetConsoleWindow
ReadConsoleOutputCharacterA
MoveFileExW
GetAtomNameW
SetCriticalSectionSpinCount
GlobalAddAtomW
IsBadStringPtrA
GetMailslotInfo
GetDiskFreeSpaceW
QueryInformationJobObject
GetCompressedFileSizeA
AddVectoredExceptionHandler
OpenJobObjectW
ReadConsoleInputA
GetConsoleProcessList
GlobalFindAtomW
SetFileApisToANSI
IsWow64Process
GetEnvironmentStrings
FlushFileBuffers
CommConfigDialogW
Sleep
VirtualFree
lstrlenA
lstrcpynA
LoadLibraryExA
GetStartupInfoA
GetCommandLineA
ExitProcess
ExitThread
UnhandledExceptionFilter
RtlUnwind
CloseHandle
VirtualAllocEx
OpenProcess
GetCurrentProcessId
WaitForDebugEvent
SetEnvironmentVariableW
GetTempPathA
SetVolumeLabelW
GetConsoleScreenBufferInfo
lstrcpyW
FlushInstructionCache
CompareStringA
CompareStringW
CreateDirectoryA
CreateDirectoryW
CreateEventA
CreateFileA
CreateFileW
CreateMutexA
CreateThread
DeleteCriticalSection
DeleteFileA
DeleteFileW
EnterCriticalSection
EnumCalendarInfoA
FindClose
FindFirstFileA
FindFirstFileW
FindResourceA
FormatMessageA
FormatMessageW
FreeLibrary
FreeResource
GetACP
GetCPInfo
GetCommandLineW
GetComputerNameA
GetCurrentProcess
GetCurrentThread
GetCurrentThreadId
GetDateFormatA
GetDiskFreeSpaceA
GetExitCodeThread
GetFileAttributesA
GetFileAttributesW
GetFullPathNameA
GetFullPathNameW
GetLastError
GetLocalTime
GetLocaleInfoA
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetPrivateProfileStringA
GetStdHandle
GetStringTypeExA
GetStringTypeExW
GetTempPathW
GetThreadLocale
GetTickCount
GetUserDefaultLangID
GetVersion
GetVersionExA
GlobalAddAtomA
GlobalAlloc
GlobalDeleteAtom
GlobalFindAtomA
GlobalFree
GlobalGetAtomNameA
GlobalLock
GlobalUnlock
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
LoadLibraryW
LoadResource
LocalFree
LockResource
MulDiv
MultiByteToWideChar
ReadFile
ReleaseMutex
ResetEvent
ResumeThread
SetEndOfFile
SetErrorMode
SetEvent
SetFilePointer
SetLastError
SetThreadLocale
SizeofResource
VirtualAlloc
VirtualProtect
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
WriteFile
WritePrivateProfileStringA
lstrcmpA
lstrcpyA
lstrlenW
LocalAlloc
TlsGetValue
TlsSetValue
GetFileType
GetFileSize
RaiseException
Sections
.text Size: 116KB - Virtual size: 115KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 112KB - Virtual size: 163KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ