Static task
static1
Behavioral task
behavioral1
Sample
abf08539cf99527027e14f81b5b931dcad309172870fdaf6722ffaf623e6153d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
abf08539cf99527027e14f81b5b931dcad309172870fdaf6722ffaf623e6153d.exe
Resource
win10v2004-20221111-en
General
-
Target
abf08539cf99527027e14f81b5b931dcad309172870fdaf6722ffaf623e6153d
-
Size
830KB
-
MD5
45346dd9ab63bf3576c246a3f834db3b
-
SHA1
2ca5a733a27b7447f866aaec36899ee67b639ceb
-
SHA256
abf08539cf99527027e14f81b5b931dcad309172870fdaf6722ffaf623e6153d
-
SHA512
3e6d65ddc52e00a5713cb9006cdea2b1667f031e5e2e472aa878537c00623c955f5554957695a34d16603e3f7dffba1cd8058369cdf7fa91bea4c4eed7aeb2d5
-
SSDEEP
24576:+D63AYVhDYjv3VBfSyoC6ZhkJmfLl+EAi:93AYzEjzfo6JSZ+ji
Malware Config
Signatures
Files
-
abf08539cf99527027e14f81b5b931dcad309172870fdaf6722ffaf623e6153d.exe windows x86
3a8122d5804a0b2ac5305e718b296eed
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTempPathA
GetTempPathW
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
VirtualProtect
GetProcAddress
VirtualAlloc
GetCurrentThreadId
WaitForSingleObject
CloseHandle
DeleteCriticalSection
GetModuleFileNameW
GetCommandLineW
GetTickCount
CreateEventA
Sleep
SetEvent
GetCurrentProcess
GetLastError
DeleteFileW
CreateEventW
CopyFileW
GetFullPathNameW
GetCurrentProcessId
LoadLibraryA
VirtualFree
SizeofResource
LoadResource
FindResourceW
FreeLibrary
GetModuleHandleA
HeapFree
ReadFile
GetSystemTimeAsFileTime
GetCommandLineA
EncodePointer
DecodePointer
CreateThread
ExitThread
LoadLibraryExW
HeapAlloc
GetProcessHeap
IsDebuggerPresent
IsProcessorFeaturePresent
SetFilePointer
MultiByteToWideChar
GetConsoleMode
ReadConsoleW
SetFilePointerEx
GetStdHandle
GetFileType
InitializeCriticalSectionAndSpinCount
GetStartupInfoW
RtlUnwind
SetLastError
InterlockedIncrement
InterlockedDecrement
WriteFile
WideCharToMultiByte
GetConsoleCP
ExitProcess
GetModuleHandleExW
AreFileApisANSI
GetModuleFileNameA
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
SetStdHandle
FlushFileBuffers
CreateFileW
WriteConsoleW
OutputDebugStringW
LoadLibraryW
HeapReAlloc
GetStringTypeW
LCMapStringW
SetEndOfFile
HeapSize
advapi32
CryptGetDefaultProviderA
CryptDuplicateHash
ConvertSidToStringSidW
comctl32
ImageList_GetImageInfo
ImageList_SetOverlayImage
ImageList_GetImageCount
Sections
.text Size: 127KB - Virtual size: 127KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 79KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 604KB - Virtual size: 604KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ