Static task
static1
Behavioral task
behavioral1
Sample
ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe
Resource
win7-20220812-en
General
-
Target
ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b
-
Size
736KB
-
MD5
84a20e79c3b5c5de1a34e153dad359fe
-
SHA1
56aedb1d58fabe505891fb93c351bd35de4c8644
-
SHA256
ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b
-
SHA512
de7de2cd9bcf19dfac6072be03b69ebb9627d2aa61e9e63412a9333d0addd5363fd4b525575111429cc9a5b39ad9a3399d94708c8f74d48562d0b19d6452a865
-
SSDEEP
6144:ijTwjof6xvJQrQMoahlJeHrs4aIEVkONMDjNbAN2MpOXR0y0XU2xTA7Da0O85wID:f4iWQMDHeHrnQNpS0ykKyIEAcIZJ
Malware Config
Signatures
Files
-
ab70e546b889a419370ec1b128a278f89b610cff27360b2405dc900128e8ae0b.exe windows x86
5882a359e4983dbdc45737d08416baf3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegDeleteKeyW
RegDeleteValueW
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegSetValueExW
RegQueryInfoKeyW
RegEnumValueW
RegEnumKeyExW
TraceMessage
RegQueryValueExW
kernel32
LoadLibraryA
CloseHandle
GetVersionExW
SetEvent
GetModuleFileNameW
GetProcessHeap
HeapAlloc
HeapFree
LoadLibraryExW
SetErrorMode
CreateThread
GetExitCodeThread
SetLastError
GetFileAttributesW
GetWindowsDirectoryW
QueryDosDeviceW
GetVersion
CreateFileA
DeviceIoControl
FindResourceW
CreateFileW
DebugBreak
GetDriveTypeW
LoadLibraryW
GetProcAddress
LeaveCriticalSection
EnterCriticalSection
ExpandEnvironmentStringsW
WideCharToMultiByte
CompareStringW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
RtlUnwind
GetStartupInfoW
InterlockedCompareExchange
Sleep
InterlockedExchange
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
MultiByteToWideChar
lstrlenW
GetLastError
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
lstrcmpiW
HeapDestroy
lstrcpynW
WaitForSingleObject
CreateEventW
lstrcatW
FreeLibrary
lstrlenA
SizeofResource
LoadResource
user32
CharNextW
CharPrevW
CharNextA
msvcrt
_lock
__dllonexit
_unlock
_controlfp
memmove
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_amsg_exit
_initterm
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
_onexit
_purecall
??_V@YAXPAX@Z
memcpy
??2@YAPAXI@Z
realloc
??3@YAXPAX@Z
free
malloc
memset
_CIsqrt
_ftol
_CIpow
_wcmdln
_vsnwprintf
??_U@YAPAXI@Z
towlower
towupper
iswspace
wcspbrk
wcschr
wcsstr
wcsrchr
wcsncmp
_wcsnicmp
_wtol
_wcsicmp
_wtoi
iswdigit
bsearch
_beginthreadex
mpr
WNetCancelConnection2W
WNetAddConnection2W
WNetGetConnectionW
ole32
CoRevokeClassObject
CoRegisterClassObject
CoTaskMemFree
CoTaskMemAlloc
CoTaskMemRealloc
CoUninitialize
CoInitializeEx
CoCreateInstance
oleaut32
SysFreeString
VarUI4FromStr
SysAllocStringLen
SysAllocString
SysStringLen
shell32
ShellExecuteExW
shlwapi
PathGetCharTypeW
PathGetCharTypeA
Sections
.text Size: 199KB - Virtual size: 198KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.vmp0 Size: 500KB - Virtual size: 1.6MB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE