Static task
static1
Behavioral task
behavioral1
Sample
abee73d0f77a870495be2c5141b5c2f5ab2cac0ef39c027f365d17a2bbdb351a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
abee73d0f77a870495be2c5141b5c2f5ab2cac0ef39c027f365d17a2bbdb351a.exe
Resource
win10v2004-20220901-en
General
-
Target
abee73d0f77a870495be2c5141b5c2f5ab2cac0ef39c027f365d17a2bbdb351a
-
Size
56KB
-
MD5
26d9671d414f8aa518ca9f53466a85e0
-
SHA1
5601312cb3f22dea1e51d8490c0c99f884c2a137
-
SHA256
abee73d0f77a870495be2c5141b5c2f5ab2cac0ef39c027f365d17a2bbdb351a
-
SHA512
e99662d579a3d47f29cbdb728fe681ced4bcbdb3c55d2d1c15a55fae242e7ef7daa72b0165b4cddedbecfd9dc1f051ac6c97504768f60091b84512603b4cc807
-
SSDEEP
1536:qrCDUc+v+ubpJE0LObL4oEBT3xBKLz6s1GhOJ9XTFaX:3+v+ub7E0LSUoEB7Pa5lvMX
Malware Config
Signatures
Files
-
abee73d0f77a870495be2c5141b5c2f5ab2cac0ef39c027f365d17a2bbdb351a.exe windows x86
176ae8e14983fca8c8fa086f89fab5cc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetConsoleLocalEUDC
FindAtomA
OutputDebugStringA
_lopen
GetStdHandle
LocalAlloc
AddConsoleAliasA
CreateDirectoryA
SetPriorityClass
lstrcatA
OpenMutexW
AddAtomA
GetTimeZoneInformation
ReadConsoleOutputCharacterW
RtlMoveMemory
GetTapePosition
SetConsoleOS2OemFormat
GetCommandLineA
ExitProcess
GetStartupInfoA
user32
GetMenuItemID
CopyAcceleratorTableA
CharNextA
IsMenu
SetScrollInfo
UnhookWindowsHookEx
GetNextDlgTabItem
SetCursorContents
CreateDialogParamW
GetKBCodePage
LoadIconW
SetCaretBlinkTime
CharLowerBuffA
Sections
.text Size: 5KB - Virtual size: 65KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 46KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 2KB - Virtual size: 660B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE