Static task
static1
Behavioral task
behavioral1
Sample
ab5736f6d0ad0b2466063cf270e3b3b62a9fa20fbf7bce4af5583d59574ccf66.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ab5736f6d0ad0b2466063cf270e3b3b62a9fa20fbf7bce4af5583d59574ccf66.exe
Resource
win10v2004-20220901-en
General
-
Target
ab5736f6d0ad0b2466063cf270e3b3b62a9fa20fbf7bce4af5583d59574ccf66
-
Size
288KB
-
MD5
e844a18555c4c6698509bebb6e28ffa2
-
SHA1
6aab01d8b81faa43ab07516b3d5b8d7dd7918c81
-
SHA256
ab5736f6d0ad0b2466063cf270e3b3b62a9fa20fbf7bce4af5583d59574ccf66
-
SHA512
170fc94cf15c74b37267fcc62fd03878f65b87ffc24a104b1e36ac3ded07744ac7b3e2ab42a4942bd793482b6f97a62d17e95e40a9cb5c3af2a05cfb774818a1
-
SSDEEP
6144:GjEDyVUtKq9o8BC2N6tdTTTbfxXuzJwGhrBN+:dmVUtKq9o8BC2N6tdTTTbfxwmGhrD
Malware Config
Signatures
Files
-
ab5736f6d0ad0b2466063cf270e3b3b62a9fa20fbf7bce4af5583d59574ccf66.exe windows x86
5cf4000d34ef929fbb57e6cdc0c7afe0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteFileA
ReleaseMutex
CreateProcessA
GetTempPathA
GetLastError
CreateMutexA
GetModuleFileNameA
CreateDirectoryA
RemoveDirectoryA
GetComputerNameA
WritePrivateProfileStringA
GetSystemTime
FileTimeToSystemTime
GetFileTime
Sleep
GetFileSize
WaitForSingleObject
GetLocalTime
GetDiskFreeSpaceA
SystemTimeToFileTime
CopyFileA
GetWindowsDirectoryA
DeviceIoControl
GetPrivateProfileStringA
GetVolumeInformationA
CompareFileTime
ResumeThread
CreateThread
GetCommandLineW
TerminateProcess
OpenProcess
GetCurrentProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
GetVersionExA
GetSystemDirectoryA
FindFirstFileA
FindNextFileA
FindClose
DosDateTimeToFileTime
LocalFileTimeToFileTime
GetUserDefaultLCID
EnumSystemLocalesA
GetLocaleInfoA
SetFileTime
SetFileAttributesA
CreateFileA
GetFileAttributesA
GetFileInformationByHandle
CloseHandle
FileTimeToLocalFileTime
FileTimeToDosDateTime
GetDriveTypeA
IsValidCodePage
IsValidLocale
HeapAlloc
HeapFree
GetFileType
ReadFile
WriteFile
SetFilePointer
RtlUnwind
RaiseException
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
IsBadWritePtr
SetEndOfFile
SetHandleCount
GetStdHandle
SetStdHandle
HeapSize
SetUnhandledExceptionFilter
GetProcAddress
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
GetCPInfo
GetACP
GetOEMCP
IsBadReadPtr
IsBadCodePtr
FlushFileBuffers
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
LoadLibraryA
LCMapStringA
LCMapStringW
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetLocaleInfoW
user32
MessageBoxA
advapi32
RegSetValueExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegOpenKeyExA
shell32
ShellExecuteA
CommandLineToArgvW
cabinet
FCICreate
FDICopy
FDIIsCabinet
FDIDestroy
FDICreate
FCIDestroy
FCIAddFile
FCIFlushCabinet
psapi
EnumProcessModules
GetModuleFileNameExA
Sections
.text Size: 120KB - Virtual size: 118KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 104KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
kfikccu Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
nmklvce Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE