Static task
static1
Behavioral task
behavioral1
Sample
abd67a5f5ed607db5f0e3061798d679cd61525d00316dc84123bb5dd89633c37.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
abd67a5f5ed607db5f0e3061798d679cd61525d00316dc84123bb5dd89633c37.exe
Resource
win10v2004-20220812-en
General
-
Target
abd67a5f5ed607db5f0e3061798d679cd61525d00316dc84123bb5dd89633c37
-
Size
12.6MB
-
MD5
18db7933d382668f5cab64238168c645
-
SHA1
e0e85b7255d3cbbd75f1f11438c54418455aeb45
-
SHA256
abd67a5f5ed607db5f0e3061798d679cd61525d00316dc84123bb5dd89633c37
-
SHA512
9c3ccf5824a0f8181b68242077adbbc7e458cf0e79ac9bff8866f6677d5eaab1a14c7da0c8c7bbcfa1237df9ab487271508f1cdccacf5798bfe275007353227f
-
SSDEEP
196608:yEApPScwNpydtIwBU8RtveLlTBGc6BrF1i6K+:epPScddtIkU4tMRT6x1lK+
Malware Config
Signatures
Files
-
abd67a5f5ed607db5f0e3061798d679cd61525d00316dc84123bb5dd89633c37.exe windows x86
c41c8b68d001daf96a9053ee6a495271
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
GetCurrentThreadId
GetModuleFileNameW
LoadLibraryExA
GetModuleHandleA
GetModuleFileNameA
GetSystemDirectoryA
CloseHandle
GetLastError
lstrcmpiW
DeleteCriticalSection
RaiseException
DecodePointer
LeaveCriticalSection
EnterCriticalSection
GetModuleHandleW
FreeLibrary
GetProcAddress
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
InitializeCriticalSectionEx
PostQueuedCompletionStatus
FormatMessageW
SetEvent
TlsAlloc
LocalFree
WideCharToMultiByte
TlsFree
FormatMessageA
CreateEventA
WaitForSingleObjectEx
CreateThread
WaitForSingleObject
GetCurrentThread
SetLastError
GetCurrentProcess
MoveFileExW
GetTempPathW
ExpandEnvironmentStringsW
CreateDirectoryW
CreateEventW
GetUserGeoID
GetGeoInfoW
GetSystemDefaultUILanguage
GetUserDefaultUILanguage
GetLocaleInfoW
GetLogicalProcessorInformation
GetSystemInfo
GlobalMemoryStatusEx
GetComputerNameW
DeleteFileW
GetSystemTimeAsFileTime
GetSystemDirectoryW
SetUnhandledExceptionFilter
GetCurrentProcessId
FindFirstFileW
FindNextFileW
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
FindClose
LoadLibraryW
CreateFileW
WriteFile
HeapFree
HeapSize
HeapReAlloc
HeapAlloc
GetProcessHeap
TlsGetValue
InitializeCriticalSectionAndSpinCount
TlsSetValue
GetTempFileNameW
SetWaitableTimer
GetQueuedCompletionStatus
SleepEx
CreateIoCompletionPort
VerifyVersionInfoW
VerSetConditionMask
QueueUserAPC
TerminateThread
WaitForMultipleObjects
CreateWaitableTimerW
InitializeCriticalSection
GetTickCount
OpenEventW
GetProcessId
ProcessIdToSessionId
GetNativeSystemInfo
GetSystemPowerStatus
ReleaseSemaphore
DuplicateHandle
CreateSemaphoreA
ResetEvent
IsWow64Process
QueryPerformanceCounter
QueryPerformanceFrequency
SetSearchPathMode
SetDllDirectoryW
HeapSetInformation
SetProcessDEPPolicy
GetFileAttributesW
GetPrivateProfileStringW
CreateFileA
DeviceIoControl
OpenThread
GetComputerNameExA
GetComputerNameExW
GetVersionExW
GlobalAlloc
GlobalFree
OpenMutexW
CreateFileMappingA
OpenFileMappingA
UnmapViewOfFile
ReleaseMutex
SwitchToThread
MapViewOfFileEx
UnregisterWaitEx
CreateMutexW
RegisterWaitForSingleObject
GetVolumeInformationW
SetThreadPriority
ReadFile
GetOverlappedResult
K32EnumProcessModules
K32GetModuleFileNameExW
GetSystemFirmwareTable
SetFileAttributesW
Wow64DisableWow64FsRedirection
Wow64RevertWow64FsRedirection
GetLogicalDriveStringsW
GetDriveTypeW
GetDiskFreeSpaceExW
GetPrivateProfileIntW
GetPrivateProfileSectionW
WritePrivateProfileStringW
ExpandEnvironmentStringsA
GetFileSizeEx
OpenProcess
K32GetModuleBaseNameW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
WaitNamedPipeW
ResumeThread
CreateProcessW
TerminateProcess
QueryFullProcessImageNameW
K32EnumProcesses
WTSGetActiveConsoleSessionId
GetExitCodeProcess
GetDynamicTimeZoneInformation
GetTimeZoneInformation
GetTimeFormatW
GetDateFormatW
SystemTimeToFileTime
SetFilePointerEx
GetFileSize
GetLocalTime
GetCurrentDirectoryW
GetTickCount64
GetThreadTimes
VirtualProtect
VirtualQuery
IsDebuggerPresent
OutputDebugStringW
GetStringTypeW
TryEnterCriticalSection
GetExitCodeThread
EncodePointer
CompareStringW
LCMapStringW
GetCPInfo
LoadLibraryA
LCMapStringA
GetUserDefaultLCID
GetStringTypeExA
GetEnvironmentVariableW
GetFileAttributesExW
GetFileInformationByHandle
GetFileTime
GetFullPathNameW
RemoveDirectoryW
SetEndOfFile
SetFileTime
GetWindowsDirectoryW
CreateDirectoryExW
CopyFileW
AreFileApisANSI
WaitForMultipleObjectsEx
OpenEventA
CreateWaitableTimerA
UnhandledExceptionFilter
IsProcessorFeaturePresent
InitializeSListHead
GetStartupInfoW
CreateTimerQueue
SignalObjectAndWait
GetThreadPriority
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
UnregisterWait
FreeLibraryAndExitThread
VirtualAlloc
VirtualFree
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
RtlUnwind
ExitThread
GetModuleHandleExW
GetFileType
PeekNamedPipe
SetEnvironmentVariableW
GetConsoleMode
ReadConsoleW
GetConsoleCP
ExitProcess
GetStdHandle
GetCommandLineA
GetCommandLineW
IsValidLocale
EnumSystemLocalesW
FlushFileBuffers
SetStdHandle
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
WriteConsoleW
SetFilePointer
LocalFileTimeToFileTime
LocalAlloc
Sections
.text Size: 9.1MB - Virtual size: 9.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2.3MB - Virtual size: 2.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 392KB - Virtual size: 593KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.didat Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 296KB - Virtual size: 296KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 526KB - Virtual size: 526KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ