Static task
static1
Behavioral task
behavioral1
Sample
ab7694f307f421d86fd7cdfaeb0adc8ff59ad7d29d5bb6301137b977647f2414.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ab7694f307f421d86fd7cdfaeb0adc8ff59ad7d29d5bb6301137b977647f2414.exe
Resource
win10v2004-20220901-en
General
-
Target
ab7694f307f421d86fd7cdfaeb0adc8ff59ad7d29d5bb6301137b977647f2414
-
Size
913KB
-
MD5
3c382d0ded31c11f8d7aed6bec3c15cb
-
SHA1
b35518b399cb7374c2fb61eac49f7c9db4ef1d66
-
SHA256
ab7694f307f421d86fd7cdfaeb0adc8ff59ad7d29d5bb6301137b977647f2414
-
SHA512
cba374ecbc0a03cd9c8083dd62d077d147deffd86ebfa4c5400e36d2162b46b79c766e8c6755ab240b59dcef41019632488756f2e63327b133ea90fbf0559001
-
SSDEEP
12288:i9fLfHbvvA3lF+4mAb6uxrO0MxGkbT2QEU3M95RY+llGrp/8chSzkmqR0vtKDj:Ej7vZ4F6UO0cbT2cYNl/cUkPRkOj
Malware Config
Signatures
Files
-
ab7694f307f421d86fd7cdfaeb0adc8ff59ad7d29d5bb6301137b977647f2414.exe windows x86
4ca4e7ac6ca83839b97dacf2be4d8627
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersionExA
GetPrivateProfileStringA
GetDiskFreeSpaceA
FindFirstFileA
FindClose
GetModuleFileNameA
GetDriveTypeA
WinExec
MoveFileExA
GetShortPathNameA
LocalAlloc
GetTempPathA
LocalFree
GetCurrentProcess
lstrcatA
SetFileTime
GetWindowsDirectoryA
GetSystemDirectoryA
WritePrivateProfileStringA
LoadLibraryA
GetProcAddress
lstrlenA
GetFullPathNameA
GlobalFree
GlobalAlloc
GetStringTypeW
GetStringTypeA
GetOEMCP
GetACP
GetCPInfo
LCMapStringW
LCMapStringA
WideCharToMultiByte
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetVersion
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
CreateDirectoryA
HeapCompact
HeapSize
TerminateProcess
ExitProcess
GetFileAttributesA
SetFileAttributesA
MoveFileA
DeleteFileA
HeapAlloc
HeapFree
GetLastError
SetCurrentDirectoryA
MultiByteToWideChar
UnhandledExceptionFilter
FreeEnvironmentStringsA
SetEnvironmentVariableA
FreeLibrary
GlobalHandle
GetEnvironmentStrings
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStdHandle
GetFileType
SetHandleCount
SetFilePointer
CreateFileA
ReadFile
WriteFile
GetCurrentDirectoryA
CloseHandle
GlobalLock
GlobalUnlock
RtlUnwind
user32
DestroyWindow
TranslateMessage
GetMessageA
IsWindowVisible
DispatchMessageA
EndPaint
CreateDialogIndirectParamA
MessageBoxA
wsprintfA
SetWindowTextA
SetWindowPos
ShowWindow
IsDialogMessageA
GetDlgItem
ScreenToClient
GetWindowRect
SendDlgItemMessageA
EnableWindow
SetFocus
SendMessageA
SetDlgItemTextA
GetDlgItemTextA
KillTimer
BeginPaint
SetTimer
RegisterWindowMessageA
OemToCharA
GetParent
GetDC
ReleaseDC
SetWindowLongA
GetClientRect
FillRect
GetWindow
GetSysColor
CreateWindowExA
LoadIconA
LoadCursorA
RegisterClassA
FindWindowA
GetLastActivePopup
BringWindowToTop
GetSystemMetrics
AdjustWindowRectEx
UpdateWindow
IsIconic
RedrawWindow
PostQuitMessage
DefWindowProcA
PostMessageA
IsDlgButtonChecked
ExitWindowsEx
CheckDlgButton
gdi32
AddFontResourceA
ExtTextOutA
GetStockObject
CreateSolidBrush
DeleteObject
CreateFontIndirectA
GetObjectA
SetBkColor
CreatePalette
GetSystemPaletteEntries
GetDeviceCaps
StretchDIBits
RealizePalette
SelectPalette
IntersectClipRect
TextOutA
SetTextColor
SetBkMode
CreateDIBPatternBrush
SelectObject
DeleteDC
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
comdlg32
GetSaveFileNameA
advapi32
AdjustTokenPrivileges
RegQueryValueA
OpenProcessToken
LookupPrivilegeValueA
RegCloseKey
RegOpenKeyA
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyA
RegSetValueExA
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ShellExecuteA
ole32
CoCreateInstance
OleInitialize
OleUninitialize
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
VerFindFileA
Sections
.text Size: 44KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ