Static task
static1
Behavioral task
behavioral1
Sample
ab2a89c9b33bd518ea9f1a53cf74283795acaf19218076d78a765fde28d67790.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ab2a89c9b33bd518ea9f1a53cf74283795acaf19218076d78a765fde28d67790.exe
Resource
win10v2004-20220812-en
General
-
Target
ab2a89c9b33bd518ea9f1a53cf74283795acaf19218076d78a765fde28d67790
-
Size
193KB
-
MD5
e05eeee6d2bdf27d5dc83910ac7ca93b
-
SHA1
c1985c15c8a4f84928e7832041c86b6d089c14fc
-
SHA256
ab2a89c9b33bd518ea9f1a53cf74283795acaf19218076d78a765fde28d67790
-
SHA512
c152327a1e9dff584b7a2ff0fae2a5ed6444c69ada6a6a6b862e62103c36c09b8647f84806f97fc3cfa59bd470a8c0d209df95de02891d11241bde826e181afc
-
SSDEEP
3072:OzA2AJKoClrGvNPuCGYR69X3wKvzNVL58ACjOJBfgPV+Muce:Ogs3YR65nVTtyPVBe
Malware Config
Signatures
Files
-
ab2a89c9b33bd518ea9f1a53cf74283795acaf19218076d78a765fde28d67790.exe windows x86
252dde7860e153ea86d1f74dc7894b4b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
CloseHandle
CreateThread
GetProcessHeap
BackupWrite
HeapReAlloc
lstrcmpA
CreateDirectoryW
EnumDateFormatsExW
TerminateProcess
GetStdHandle
SetStdHandle
LCMapStringW
LCMapStringA
RtlUnwind
ExitProcess
HeapFree
HeapAlloc
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
GetCPInfo
GetACP
GetOEMCP
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
FlushFileBuffers
IsBadCodePtr
SetUnhandledExceptionFilter
GetFileType
GetStringTypeW
MultiByteToWideChar
GetStringTypeA
IsBadReadPtr
_lclose
GetDiskFreeSpaceA
CreateProcessA
GlobalAlloc
GetExitCodeProcess
lstrcatA
GetSystemInfo
lstrcpyA
lstrlenA
GetPrivateProfileStringA
WritePrivateProfileStringA
GetTempFileNameA
GetWindowsDirectoryA
SetErrorMode
GetTempPathA
GetPrivateProfileIntA
lstrcmpiA
GetModuleFileNameA
GetTickCount
GetUserDefaultLCID
GlobalFree
GlobalUnlock
GlobalHandle
GetLocaleInfoA
GetCurrentThread
GetCurrentProcess
VerLanguageNameA
GetProcAddress
DeleteFileA
RemoveDirectoryA
GetFileAttributesA
CreateDirectoryA
GetDriveTypeA
OpenFile
GlobalLock
FreeLibrary
LoadLibraryA
CreateFileA
IsValidCodePage
SetFilePointer
WriteFile
ReadFile
GetVersionExA
GetLastError
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetModuleHandleW
Sleep
IsDebuggerPresent
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
RaiseException
InitializeCriticalSectionAndSpinCount
HeapSize
GetConsoleCP
GetConsoleMode
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
Sections
.text Size: 88KB - Virtual size: 87KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 72.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 81KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ