Static task
static1
Behavioral task
behavioral1
Sample
ab30234e0df898c9d2c48c54efb372496e922fda61942ddece68113444dbf698.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ab30234e0df898c9d2c48c54efb372496e922fda61942ddece68113444dbf698.exe
Resource
win10v2004-20220812-en
General
-
Target
ab30234e0df898c9d2c48c54efb372496e922fda61942ddece68113444dbf698
-
Size
798KB
-
MD5
5e9746ada9aa5dbe0129d6c3af00daef
-
SHA1
92b9fe9ca6d588ad1ffd090b2541da9263b3cd57
-
SHA256
ab30234e0df898c9d2c48c54efb372496e922fda61942ddece68113444dbf698
-
SHA512
c281c1e6854ff5cb1f4f4da3cb3e1ab06823bf48ec74808ce05e0a35ea4e51b4dcef5526165dcbbf095f4c0406cdf13a3aa99157c24448c9eab8855334fd13a1
-
SSDEEP
12288:SWWQvazcK2YmAdqZptuUd/nmnZb14o8TQJS9a5dHu8+gUjyGqoux6:zrvGcDAIR9mntWwzDUjyGkx6
Malware Config
Signatures
Files
-
ab30234e0df898c9d2c48c54efb372496e922fda61942ddece68113444dbf698.exe windows x86
a6695749a5c4713dc174081faf634c58
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualProtect
GetProcAddress
VirtualAlloc
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
WaitForSingleObject
CloseHandle
FreeLibrary
DeleteCriticalSection
GetModuleFileNameW
GetTickCount
CreateEventA
Sleep
SetEvent
GetCurrentProcess
GetFullPathNameW
DeleteFileW
CreateEventW
GetLastError
CopyFileW
GetCurrentProcessId
LoadLibraryA
VirtualFree
SizeofResource
LoadResource
FindResourceW
GetCommandLineW
GetModuleHandleA
HeapFree
ReadFile
GetSystemTimeAsFileTime
GetCommandLineA
EncodePointer
DecodePointer
CreateThread
ExitThread
LoadLibraryExW
HeapAlloc
GetProcessHeap
IsDebuggerPresent
IsProcessorFeaturePresent
SetFilePointer
MultiByteToWideChar
GetConsoleMode
ReadConsoleW
SetFilePointerEx
GetStdHandle
GetFileType
InitializeCriticalSectionAndSpinCount
GetStartupInfoW
RtlUnwind
SetLastError
InterlockedIncrement
InterlockedDecrement
WriteFile
WideCharToMultiByte
GetConsoleCP
ExitProcess
GetModuleHandleExW
AreFileApisANSI
GetModuleFileNameA
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
SetStdHandle
FlushFileBuffers
CreateFileW
WriteConsoleW
OutputDebugStringW
LoadLibraryW
HeapReAlloc
GetStringTypeW
LCMapStringW
SetEndOfFile
HeapSize
advapi32
BuildExplicitAccessWithNameA
CryptDestroyKey
CryptGenKey
comctl32
ImageList_GetBkColor
PropertySheetW
ImageList_Read
Sections
.text Size: 114KB - Virtual size: 114KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 288KB - Virtual size: 297KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 380KB - Virtual size: 379KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ