Static task
static1
Behavioral task
behavioral1
Sample
abb030d233f4f665d848475398f2262e8d7e6f698ce790bd7d80660e84381b17.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
abb030d233f4f665d848475398f2262e8d7e6f698ce790bd7d80660e84381b17.exe
Resource
win10v2004-20220812-en
General
-
Target
abb030d233f4f665d848475398f2262e8d7e6f698ce790bd7d80660e84381b17
-
Size
155KB
-
MD5
937c5eb9eea9de592e42aa2f9635106e
-
SHA1
3a2d849ccf97fc80cb04d818e2725f6727790a25
-
SHA256
abb030d233f4f665d848475398f2262e8d7e6f698ce790bd7d80660e84381b17
-
SHA512
ecb5ab2abc711985f14590a0e0c1da6b3b61e3aea8a6226918bf6c1895a36e1d139817142f77a391e95c9eb511af5b98f94c46d7a6823544c23c19720cd5969f
-
SSDEEP
3072:BPesuw0JArGJMRaCXN0qWm0zvucyqwgCyKY8Xb8Y+o/:Vow0JAKGV90CoVYn
Malware Config
Signatures
Files
-
abb030d233f4f665d848475398f2262e8d7e6f698ce790bd7d80660e84381b17.exe windows x86
72e0386ab775a3b0a303a596c95a5144
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
kernel32
LocalFree
FormatMessageW
GetPrivateProfileStringW
GetVersion
InterlockedExchange
GetACP
GetLocaleInfoA
GetVersionExW
WaitForSingleObject
OutputDebugStringW
GetPrivateProfileIntW
WritePrivateProfileStructW
WritePrivateProfileStringW
IsBadCodePtr
IsBadReadPtr
GetStringTypeW
GetStringTypeA
CloseHandle
GetModuleFileNameW
GetCurrentProcess
GetLastError
GlobalAlloc
GlobalFree
FlushFileBuffers
SetStdHandle
GetPrivateProfileStructW
GetStartupInfoW
SetFilePointer
GetCPInfo
LoadLibraryA
IsBadWritePtr
SetUnhandledExceptionFilter
HeapSize
HeapReAlloc
LCMapStringW
WideCharToMultiByte
GetModuleHandleA
GetOEMCP
GetVersionExA
ExitProcess
RtlUnwind
RaiseException
HeapAlloc
GetProcAddress
TerminateProcess
WriteFile
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
MultiByteToWideChar
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
LCMapStringA
advapi32
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
OpenProcessToken
GetTokenInformation
AllocateAndInitializeSid
EqualSid
FreeSid
shlwapi
PathFileExistsW
PathAddBackslashW
PathRemoveFileSpecW
PathRemoveBackslashW
Sections
.text Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 156KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.shared Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.mstp Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
DATA Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
DATA Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
PDAT Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IDAT Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 260B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ