Static task
static1
Behavioral task
behavioral1
Sample
4ab8617824233a6823f0e1a74d45e18e3f499912d9eb0471661e34e0346263fd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4ab8617824233a6823f0e1a74d45e18e3f499912d9eb0471661e34e0346263fd.exe
Resource
win10v2004-20221111-en
General
-
Target
4ab8617824233a6823f0e1a74d45e18e3f499912d9eb0471661e34e0346263fd
-
Size
124KB
-
MD5
446d045e1f80409868b2e8cfb9f2e580
-
SHA1
f6b6df5963a11dcb62cb5223a341f47564640664
-
SHA256
4ab8617824233a6823f0e1a74d45e18e3f499912d9eb0471661e34e0346263fd
-
SHA512
f85b7c73704553ad8df9bff8d367d44af0472991d0c7069f7fc913fa71e5ce909da1f5dadab0585bacd2667b1750432cac09fc472ce3c36505fe558c18f71473
-
SSDEEP
1536:L6bTKsTL8FaTMIroT6+JU97GtXfXN5XkJIofL0cc148UlcV2jnCIV+Uq8WL7ST:LcT3oS4JOGVvN50JIofLf6VCnCmyw
Malware Config
Signatures
Files
-
4ab8617824233a6823f0e1a74d45e18e3f499912d9eb0471661e34e0346263fd.exe windows x86
54e1fa8cf1a3fc2453b51c9a59992c5b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
ResetEvent
OpenProcess
GetProcAddress
CreateProcessA
FindClose
FindFirstFileA
GetVersionExA
GetSystemDirectoryA
GetModuleHandleA
TerminateProcess
GlobalFree
GlobalAlloc
ReleaseMutex
GetCurrentProcessId
ReadFile
SetStdHandle
SetFilePointer
WaitForMultipleObjects
Sleep
SetUnhandledExceptionFilter
SetEnvironmentVariableA
GetOEMCP
GetACP
CompareStringW
CompareStringA
GetStringTypeW
GetStringTypeA
GetCPInfo
FlushFileBuffers
IsBadWritePtr
HeapReAlloc
VirtualAlloc
FreeEnvironmentStringsA
VirtualFree
HeapCreate
HeapDestroy
WaitForSingleObject
SetEvent
FreeLibrary
CreateThread
GetModuleFileNameA
CreateMutexA
GetLastError
CreateEventA
IsBadReadPtr
IsBadCodePtr
WriteFile
GetStdHandle
SetHandleCount
CloseHandle
GetEnvironmentVariableA
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
EnterCriticalSection
LeaveCriticalSection
ExitProcess
GetCurrentProcess
InterlockedDecrement
InterlockedIncrement
GetFileAttributesA
RtlUnwind
GetStartupInfoA
GetCommandLineA
GetVersion
UnhandledExceptionFilter
GetFileType
DeleteCriticalSection
HeapAlloc
InitializeCriticalSection
WideCharToMultiByte
MultiByteToWideChar
LCMapStringA
LCMapStringW
HeapFree
GetCurrentThreadId
TlsSetValue
TlsAlloc
SetLastError
TlsGetValue
user32
SetForegroundWindow
GetCursorPos
DispatchMessageA
TranslateMessage
FindWindowA
GetWindowThreadProcessId
SendMessageA
AppendMenuA
CreatePopupMenu
ModifyMenuA
LoadMenuA
GetSubMenu
DestroyMenu
EnableMenuItem
SetMenuDefaultItem
wsprintfA
GetMessageA
TrackPopupMenu
MessageBoxA
GetWindowLongA
DefWindowProcA
LoadStringA
LoadIconA
LoadCursorA
RegisterClassExA
CreateWindowExA
PostQuitMessage
SetWindowLongA
PostMessageA
gdi32
GetStockObject
advapi32
RegQueryInfoKeyA
RegEnumValueA
RegDeleteValueA
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
shell32
ShellExecuteA
Shell_NotifyIconA
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
Sections
.text Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
kduafsa Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE