Static task
static1
Behavioral task
behavioral1
Sample
ab3c1f2be9c69e05989f410c23fa5654594a25bddeeccb52063f6b8259612655.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ab3c1f2be9c69e05989f410c23fa5654594a25bddeeccb52063f6b8259612655.exe
Resource
win10v2004-20220812-en
General
-
Target
ab3c1f2be9c69e05989f410c23fa5654594a25bddeeccb52063f6b8259612655
-
Size
21KB
-
MD5
d45afa572bc809657a8a30d77ed5fd31
-
SHA1
4b74a88538f07613a4f3c59a45e766df6749821f
-
SHA256
ab3c1f2be9c69e05989f410c23fa5654594a25bddeeccb52063f6b8259612655
-
SHA512
ccb93a17d0e351d8b9d86b2b2d376e6ac6825c889b02c41df340649ae359f1d4ffcffe4d354e23613a1f06d301f1eb366c07a04ab882d692e47229e82e0b14d3
-
SSDEEP
384:KsLT62X9qvSV+mC6VNwUK5LRuiohJsU4WI:jHX9qvdmHVNwlLR5qZs
Malware Config
Signatures
Files
-
ab3c1f2be9c69e05989f410c23fa5654594a25bddeeccb52063f6b8259612655.exe windows x86
68733406b06a67881dc83da5d43fda78
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindVolumeClose
CloseHandle
VirtualAlloc
WaitForSingleObject
ReleaseMutex
EnterCriticalSection
SetFileAttributesA
FindAtomW
FindVolumeClose
DeleteAtom
SetEndOfFile
GetModuleHandleA
GetFileSize
GetEnvironmentVariableA
ResumeThread
IsBadReadPtr
DeleteFileA
HeapSize
GetCommandLineA
CreateFileA
GetStdHandle
GetExitCodeThread
ExitProcess
GetVersion
GetCurrentDirectoryA
shell32
DragFinish
SHGetMalloc
SHFree
DragQueryFileA
SHFree
DllUnregisterServer
DuplicateIcon
SHGetSettings
StrChrA
ShellAboutA
ShellMessageBoxA
DragAcceptFiles
ExtractIconA
snmpapi
SnmpTfxClose
SnmpTfxClose
SnmpTfxClose
SnmpTfxClose
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 10B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ