Static task
static1
Behavioral task
behavioral1
Sample
ab35bbe09ea3eae3effae9264a5e1752d28a4e94d8a37f4f80afe3083d1e6b53.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ab35bbe09ea3eae3effae9264a5e1752d28a4e94d8a37f4f80afe3083d1e6b53.exe
Resource
win10v2004-20220812-en
General
-
Target
ab35bbe09ea3eae3effae9264a5e1752d28a4e94d8a37f4f80afe3083d1e6b53
-
Size
504KB
-
MD5
ff1857a970f780ba7793c731bb67bd7e
-
SHA1
6672caf71d788f1de7f3241d7101e404efdab4a4
-
SHA256
ab35bbe09ea3eae3effae9264a5e1752d28a4e94d8a37f4f80afe3083d1e6b53
-
SHA512
83fd361881fc3ead3ca1db22aefc8017bd4b4d4882f6e517637ded7dbcc6e43d4f0cde2802082d6c3a56e8f41be6d9b306917463a61011ba472f7612bbf526b1
-
SSDEEP
12288:i68y0ckM5bQ6ePfRm56u372+siULVJKs5USjc:18yJzeBmJL2+sz2sE
Malware Config
Signatures
Files
-
ab35bbe09ea3eae3effae9264a5e1752d28a4e94d8a37f4f80afe3083d1e6b53.exe windows x86
43d3b3de34e26df628322bdd5bb5f197
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHGetSpecialFolderPathA
SHGetNewLinkInfo
DragFinish
SHQueryRecycleBinW
SHGetInstanceExplorer
user32
SetPropA
SetClassWord
RegisterClassExA
CallWindowProcW
SetClipboardData
GetClipCursor
ShowCaret
CharToOemW
ArrangeIconicWindows
UnhookWindowsHookEx
FlashWindow
WindowFromDC
MoveWindow
DdeUnaccessData
RemoveMenu
ShowWindow
DialogBoxParamA
ChangeDisplaySettingsExW
DestroyWindow
PostThreadMessageA
GetDlgItemTextW
CreateIcon
PackDDElParam
EnumDesktopsA
RegisterClassA
SetUserObjectInformationW
DefWindowProcA
GetSubMenu
DefDlgProcA
CloseWindowStation
GetInputState
CharPrevExA
SetWindowsHookW
ActivateKeyboardLayout
DrawTextExA
GetIconInfo
CreateAcceleratorTableW
AttachThreadInput
GetUpdateRect
CreateWindowStationA
CreateWindowExW
MapVirtualKeyW
LockWindowUpdate
GetClassInfoExA
MessageBeep
MessageBoxA
CheckMenuRadioItem
SendDlgItemMessageA
DdeGetData
LoadMenuA
VkKeyScanA
GetFocus
DrawEdge
wininet
InternetSetDialStateW
LoadUrlCacheContent
InternetCheckConnectionA
RetrieveUrlCacheEntryFileW
InternetFindNextFileW
FindNextUrlCacheContainerA
DeleteUrlCacheEntry
comctl32
ImageList_GetBkColor
ImageList_SetFlags
ImageList_SetImageCount
ImageList_DragMove
ImageList_ReplaceIcon
ImageList_EndDrag
InitCommonControlsEx
kernel32
GetUserDefaultLCID
GetTimeFormatA
GetTickCount
WriteConsoleW
FreeEnvironmentStringsA
SetEnvironmentVariableA
LCMapStringW
SetFilePointer
EnumSystemLocalesA
GetComputerNameA
HeapReAlloc
GetCommandLineA
CreateMutexA
FreeEnvironmentStringsW
EnumTimeFormatsW
RtlUnwind
CloseHandle
GetProcessHeap
IsValidCodePage
GetCurrentProcessId
lstrcmpiW
CompareStringW
GetLastError
InterlockedDecrement
SetStdHandle
FreeLibrary
GetTimeZoneInformation
SetConsoleCtrlHandler
GetConsoleMode
GetCurrentProcess
QueryPerformanceCounter
GetStringTypeA
CompareStringA
HeapFree
GetFileType
GetLocaleInfoW
GetLocaleInfoA
GetEnvironmentStringsW
GetDateFormatA
DeleteCriticalSection
HeapDestroy
VirtualAlloc
SetHandleCount
GetModuleFileNameW
GetCPInfo
ExitProcess
GetConsoleCP
GetCurrentThread
GetStartupInfoA
HeapSize
IsValidLocale
SetUnhandledExceptionFilter
WriteFile
GetConsoleOutputCP
GetStdHandle
CreateFileA
LoadLibraryA
GetProcAddress
WriteConsoleA
TlsSetValue
InitializeCriticalSection
EnterCriticalSection
OpenMutexA
UnhandledExceptionFilter
ReadFile
LCMapStringA
MultiByteToWideChar
GetOEMCP
TlsAlloc
GetEnvironmentStrings
TlsGetValue
IsDebuggerPresent
InterlockedExchange
Sleep
TerminateProcess
SetLastError
TlsFree
HeapAlloc
GetACP
GetModuleFileNameA
GetModuleHandleA
VirtualFree
GetCommandLineW
HeapCreate
FlushFileBuffers
GetCurrentThreadId
WideCharToMultiByte
LeaveCriticalSection
GetStringTypeW
VirtualQuery
GetStartupInfoW
GetSystemTimeAsFileTime
lstrcpynA
GetSystemTime
InterlockedIncrement
GetVersionExA
Sections
.text Size: 108KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 248KB - Virtual size: 246KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 112KB - Virtual size: 114KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ