Static task
static1
Behavioral task
behavioral1
Sample
abcaa4ff082ea55e2b2f734073065572cf0c956221303e7f2985116b5d70ce15.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
abcaa4ff082ea55e2b2f734073065572cf0c956221303e7f2985116b5d70ce15.exe
Resource
win10v2004-20220812-en
General
-
Target
abcaa4ff082ea55e2b2f734073065572cf0c956221303e7f2985116b5d70ce15
-
Size
49KB
-
MD5
73f271e627b7508ce179f97a5358aa15
-
SHA1
ec7001b00be0394b8c6c8028c1cea6a96e852131
-
SHA256
abcaa4ff082ea55e2b2f734073065572cf0c956221303e7f2985116b5d70ce15
-
SHA512
238d0769b160b3329cae364f053ceec9b5db16ba80dc39005e96ed5cda0c6eae7bc1a26c5d2cf7972501c5989622f7ad24c487b4b0bb1512319ec6d681bb281e
-
SSDEEP
1536:VKwJGtxS+dSN5GaFoGes7H6MKLvSiZi1et:ZJYxS+dSaaKsWMaqet
Malware Config
Signatures
Files
-
abcaa4ff082ea55e2b2f734073065572cf0c956221303e7f2985116b5d70ce15.exe windows x86
5c26e647771c1f3ee8a3f8b791a2f0b4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetLastError
GetEnvironmentStringsA
GetModuleFileNameA
GetFileSize
GetFileAttributesW
OpenSemaphoreA
CreateFileA
SetEvent
ReadConsoleA
HeapSize
Sleep
GetTickCount
CloseHandle
lstrlenA
GetStartupInfoA
CreateSemaphoreW
DeleteFileA
WriteConsoleA
LoadLibraryA
GlobalFree
GetProcessHeap
VirtualProtect
SetLastError
CreateDirectoryW
SetLocalTime
user32
GetClassInfoA
SetFocus
PeekMessageA
CallWindowProcW
GetWindowLongA
FindWindowA
GetSysColor
DrawTextW
IsWindow
DestroyMenu
IsZoomed
DispatchMessageA
DispatchMessageA
traffic
TcAddFilter
TcDeleteFilter
TcAddFlow
TcDeleteFlow
advapi32
RegCloseKey
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 296KB - Virtual size: 296KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE