Static task
static1
Behavioral task
behavioral1
Sample
98ab3ade8ed8a8697cb55ba6068b27ecd08dcfca901598753f3049ca5f078d63.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
98ab3ade8ed8a8697cb55ba6068b27ecd08dcfca901598753f3049ca5f078d63.exe
Resource
win10v2004-20220901-en
General
-
Target
98ab3ade8ed8a8697cb55ba6068b27ecd08dcfca901598753f3049ca5f078d63
-
Size
201KB
-
MD5
90f6fb2f6014534337ce7bb7f2a0d690
-
SHA1
6dee04102e8dc2e962af94ba57481b7c3b87b954
-
SHA256
98ab3ade8ed8a8697cb55ba6068b27ecd08dcfca901598753f3049ca5f078d63
-
SHA512
e211197ba563e75d8a970ea5db05075e80b5876df09c1d555a7d7b98e055f313964ea872b487850c8133e2de30691daba3c2a4ca0428c279a8ada4ad05332352
-
SSDEEP
3072:mCy6aBb0MxK/dj0QUiXrinZvaWohWoYUIcOWEZqVXwW2Jh1A8jnITbT5j2m4QS6q:ICHFj0zxbcOLEdcQGI3YuS60ll
Malware Config
Signatures
Files
-
98ab3ade8ed8a8697cb55ba6068b27ecd08dcfca901598753f3049ca5f078d63.exe windows x86
8b6d88c2802385a55b461f116c032ce1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
bull80u
?tgz@BULL@@YAJPB_WPAUIGeneralArray@1@@Z
?EnableNamedObject@BULL@@YAJPA_WABU_GUID@@@Z
?CreateObjectNative@BULL@@YAJABU_GUID@@0PAPAX@Z
?AssertOut@BULL@@YAJPB_WH_N0@Z
?GetNamedObject@BULL@@YAJPA_WABU_GUID@@1PAPAX@Z
apputil
?TransformUtf8BufferToBSTR@Misc@AppUtil@@YAJPAUIGeneralBuffer@BULL@@PAPA_W@Z
?Parse@JsonLib@@YAJPA_WPAPAUIGeneralData@BULL@@@Z
kernel32
GetStdHandle
AllocConsole
InitializeCriticalSection
WriteConsoleW
SetConsoleTextAttribute
FindResourceW
GetCurrentThreadId
DeleteCriticalSection
SizeofResource
SetErrorMode
LockResource
OutputDebugStringW
LoadResource
RaiseException
FindResourceExW
GetSystemTime
TlsFree
EnterCriticalSection
GetConsoleScreenBufferInfo
MultiByteToWideChar
lstrcmpiW
GetModuleHandleW
lstrlenW
GetModuleFileNameW
InterlockedDecrement
LeaveCriticalSection
LoadLibraryExW
FreeLibrary
InterlockedIncrement
WideCharToMultiByte
CreateFileW
ReadFile
GetFileSize
GetTempPathW
CloseHandle
TerminateProcess
GetStartupInfoW
TlsGetValue
FreeConsole
GetPrivateProfileIntW
TlsAlloc
LocalFree
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetLastError
DeleteFileW
MoveFileExW
GetThreadLocale
GetLocaleInfoA
GetACP
GetVersionExA
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
InterlockedCompareExchange
Sleep
InterlockedExchange
IsDebuggerPresent
user32
PostQuitMessage
TranslateMessage
DispatchMessageW
DefWindowProcW
UnregisterClassA
GetMessageW
CharNextW
advapi32
RegCreateKeyExW
RegOpenKeyExW
RegDeleteKeyW
RegSetValueExW
RegQueryInfoKeyW
RegEnumKeyExW
RegDeleteValueW
RegCloseKey
shell32
CommandLineToArgvW
ole32
OleUninitialize
OleInitialize
CoTaskMemAlloc
CoCreateInstance
CoInitializeEx
CoTaskMemRealloc
CoUninitialize
CoTaskMemFree
oleaut32
LoadTypeLi
LoadRegTypeLi
VarUI4FromStr
SysFreeString
SysStringLen
SysAllocString
msvcr80
_localtime64_s
free
_recalloc
malloc
wcsspn
wcscspn
wcsrchr
vswprintf_s
_vscprintf
vsprintf_s
_wtoi
_mktime64
_unlock
__dllonexit
_encode_pointer
_lock
_onexit
_decode_pointer
?terminate@@YAXXZ
wcsftime
__wgetmainargs
_cexit
_exit
_XcptFilter
exit
_wcmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler4_common
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_invoke_watson
_controlfp_s
?what@exception@std@@UBEPBDXZ
wcsncpy_s
_wcslwr_s
??0exception@std@@QAE@ABV01@@Z
_purecall
_invalid_parameter_noinfo
memmove_s
??0exception@std@@QAE@XZ
_wfsopen
??_U@YAPAXI@Z
_vscwprintf
fclose
memcpy_s
_vsnwprintf_s
fwprintf
??0exception@std@@QAE@ABQBD@Z
??1exception@std@@UAE@XZ
fflush
_time64
_amsg_exit
setlocale
_wcsicmp
??_V@YAXPAX@Z
??3@YAXPAX@Z
memset
_CxxThrowException
_waccess
__CxxFrameHandler3
??2@YAPAXI@Z
memcpy
msvcp80
?reserve@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEXI@Z
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@I_W@Z
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@PB_WI@Z
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@ABV01@@Z
??1?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@PB_W@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??$?H_WU?$char_traits@_W@std@@V?$allocator@_W@1@@std@@YA?AV?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@0@ABV10@PB_W@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?substr@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QBE?AV12@II@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
??4?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@PB_W@Z
??Y?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@ABV01@@Z
Sections
.text Size: 64KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 104KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE