Static task
static1
Behavioral task
behavioral1
Sample
fab1008e4e209a01468a59dd729e9c9b7af64a5047916b4ad885b06a245912b7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fab1008e4e209a01468a59dd729e9c9b7af64a5047916b4ad885b06a245912b7.exe
Resource
win10v2004-20220812-en
General
-
Target
fab1008e4e209a01468a59dd729e9c9b7af64a5047916b4ad885b06a245912b7
-
Size
108KB
-
MD5
096adf5f2a0e495f85ccedc4133f8050
-
SHA1
27611ffaa5a30eb6758226fc48e0beb06883a882
-
SHA256
fab1008e4e209a01468a59dd729e9c9b7af64a5047916b4ad885b06a245912b7
-
SHA512
d892e094af9c40e44fa25887f1aaee456284921f19f44644f056a33ce8706ac8a05d203a3a931db2e444605f2701a2d54615661a6eea14773b0e580e7aa09171
-
SSDEEP
3072:qE9cKL+9ZUlsKjUHZTzLRKQm2SRQdW+kv0DX:qE9rL+ffgwN/RK2SRQdWj0
Malware Config
Signatures
Files
-
fab1008e4e209a01468a59dd729e9c9b7af64a5047916b4ad885b06a245912b7.exe windows x86
eb0eff780527e323c357000cfe6b7c4c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_controlfp
_onexit
__dllonexit
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_cexit
_XcptFilter
_exit
_c_exit
swscanf
iswctype
_ftol
_wcsupr
_wcsicmp
_fmode
_wfopen
fgetws
fclose
wcscmp
localeconv
atoi
sprintf
towupper
wcsstr
swprintf
_local_unwind2
wcscat
wcsrchr
wcschr
wcscspn
wcsncmp
wcsncat
wcscpy
memmove
??3@YAXPAX@Z
??2@YAPAXI@Z
wcslen
wcsncpy
_wtoi
_except_handler3
advapi32
GetSecurityDescriptorDacl
InitializeSecurityDescriptor
AllocateAndInitializeSid
SetEntriesInAclW
LookupPrivilegeValueW
OpenProcessToken
SetSecurityDescriptorDacl
FreeSid
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
AdjustTokenPrivileges
kernel32
WideCharToMultiByte
FlushFileBuffers
SetFilePointer
OutputDebugStringA
GetLocalTime
SystemTimeToFileTime
LocalFree
SetErrorMode
DeviceIoControl
GlobalHandle
GetFileAttributesExW
GetFileInformationByHandle
GetExitCodeThread
GetComputerNameW
OpenEventW
ExitThread
SetEvent
GetCommandLineW
CreateThread
GetSystemPowerStatus
GetVersionExW
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleHandleA
GetStartupInfoA
QueryPerformanceCounter
GetCurrentProcess
GlobalLock
GlobalFree
GlobalReAlloc
GlobalUnlock
GlobalSize
GlobalAlloc
SetLastError
ReadFile
WriteFile
InterlockedIncrement
InterlockedDecrement
Sleep
CloseHandle
GetLastError
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
lstrcpyW
GetFileSize
CreateFileW
ReleaseMutex
lstrcatW
FormatMessageW
GetCurrentThreadId
lstrlenW
GetTimeFormatW
GetDateFormatW
WaitForSingleObject
lstrcpynW
SizeofResource
FindResourceW
lstrcmpiW
CompareStringW
ExpandEnvironmentStringsW
LoadLibraryW
GetDiskFreeSpaceW
lstrcmpW
GetVolumeInformationW
GetVolumeNameForVolumeMountPointW
GetDriveTypeW
FindVolumeMountPointClose
FindNextVolumeMountPointW
FindFirstVolumeMountPointW
GetSystemWindowsDirectoryW
gdi32
GetStockObject
user32
LoadStringW
CharUpperW
wvsprintfA
SendMessageW
DefWindowProcW
MessageBoxW
LoadCursorW
CreateWindowExW
SetTimer
KillTimer
PostQuitMessage
DestroyWindow
DispatchMessageW
TranslateMessage
GetMessageW
RegisterClassExW
PostMessageW
wsprintfW
ntdll
NtQueryInformationFile
NtFsControlFile
NtQueryVolumeInformationFile
NtWaitForSingleObject
comctl32
ord17
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListW
ole32
CoUninitialize
CoCreateInstanceEx
CLSIDFromString
CoRegisterClassObject
ReleaseStgMedium
CoInitializeEx
vssapi
ord5
Sections
.text Size: 75KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
zustxtj Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE