Static task
static1
Behavioral task
behavioral1
Sample
ab0ffe398631ecff2b91f8e84a949d1c94e210820e951a21677768308d14014b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ab0ffe398631ecff2b91f8e84a949d1c94e210820e951a21677768308d14014b.exe
Resource
win10v2004-20220812-en
General
-
Target
ab0ffe398631ecff2b91f8e84a949d1c94e210820e951a21677768308d14014b
-
Size
176KB
-
MD5
0917948449568cf55117af5ce97b3c46
-
SHA1
1cabcc30b8d86d6ee219dc6919c6fb5968542238
-
SHA256
ab0ffe398631ecff2b91f8e84a949d1c94e210820e951a21677768308d14014b
-
SHA512
79c8e35a3c948ace6c674680fc26d530ef8dc219791ec85f7050229c44f8fdadebe94cc31d5b8672610fc449944e53df53a74f877a484073a11da083ff05deda
-
SSDEEP
3072:fYh2uXx5F4FmfJiwWrn7ckJ7OA2XABU7/NdRSaX:F6fWn7cq2w2DE
Malware Config
Signatures
Files
-
ab0ffe398631ecff2b91f8e84a949d1c94e210820e951a21677768308d14014b.exe windows x86
cd52d04c34a21660a102a97fb574f530
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
tmcclnt
InitSDM
DestroySDM
lddwnld
?ListFilesInCache@@YAXXZ
kernel32
GetSystemDefaultLCID
GetVersionExA
WideCharToMultiByte
CloseHandle
WaitForMultipleObjects
CreateThread
CreateEventA
SetEvent
GetCurrentProcessId
WaitForSingleObject
OpenEventA
Sleep
ReleaseMutex
GetCurrentThreadId
IsBadReadPtr
LoadLibraryA
OpenMutexA
GetProcessHeap
SetEndOfFile
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetLocaleInfoW
HeapSize
SetFilePointer
LCMapStringW
LCMapStringA
GetTickCount
GetProcAddress
FreeLibrary
GetModuleHandleA
EnumResourceLanguagesA
FindResourceExA
FindResourceA
LoadResource
LockResource
SizeofResource
GetModuleFileNameA
lstrcpyA
lstrcatA
lstrlenA
ReadFile
CompareStringA
CompareStringW
SetEnvironmentVariableA
CreateMutexA
InterlockedDecrement
RaiseException
RtlUnwind
GetModuleHandleW
ExitProcess
InterlockedIncrement
InitializeCriticalSection
HeapAlloc
GetTimeFormatA
GetDateFormatA
GetTimeZoneInformation
GetSystemTimeAsFileTime
GetLastError
HeapFree
GetCommandLineA
GetStartupInfoA
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThread
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
WriteFile
GetStdHandle
DeleteCriticalSection
LeaveCriticalSection
FatalAppExitA
EnterCriticalSection
SetConsoleCtrlHandler
InterlockedExchange
InitializeCriticalSectionAndSpinCount
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
VirtualFree
VirtualAlloc
HeapReAlloc
HeapCreate
HeapDestroy
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetHandleCount
GetFileType
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
user32
LoadStringA
DialogBoxParamA
RegisterClassExA
CreateWindowExA
GetMessageA
TranslateMessage
DispatchMessageA
DestroyWindow
PostQuitMessage
DefWindowProcA
EndDialog
CharPrevA
advapi32
QueryServiceStatus
DeleteService
CreateServiceA
SetServiceStatus
RegisterServiceCtrlHandlerA
StartServiceCtrlDispatcherA
OpenSCManagerA
OpenServiceA
StartServiceA
CloseServiceHandle
RegQueryValueExA
RegCloseKey
RegDeleteKeyA
RegDeleteValueA
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
ControlService
Sections
.text Size: 145KB - Virtual size: 144KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ