Static task
static1
Behavioral task
behavioral1
Sample
adb2b02d3f41652d4e9938bc0312bb3777d3b771da9e865c3c462cc545a1cd18.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
adb2b02d3f41652d4e9938bc0312bb3777d3b771da9e865c3c462cc545a1cd18.exe
Resource
win10v2004-20221111-en
General
-
Target
adb2b02d3f41652d4e9938bc0312bb3777d3b771da9e865c3c462cc545a1cd18
-
Size
48KB
-
MD5
5a3cda753ed9fd03f2b2b6c6be66a77e
-
SHA1
d5f5b70c9250fe10adf6ac549485aca0b6f9e476
-
SHA256
adb2b02d3f41652d4e9938bc0312bb3777d3b771da9e865c3c462cc545a1cd18
-
SHA512
67e0a6fc1d289d3317273c4c86ed201f329b356d4ba824c0fffce5a8a9074eec1eacfafbe7f85786caf976b2e4664831249cca0c3d5747a76c93f0cd73aecf52
-
SSDEEP
384:Vn1z4DDX+nLGIkEmhEBACo9AxtQ/sT0jlOjkICGk2wKv3g065P0:V1Ef2LGy4jAxtrdU15P0
Malware Config
Signatures
Files
-
adb2b02d3f41652d4e9938bc0312bb3777d3b771da9e865c3c462cc545a1cd18.exe windows x86
238d87c5f11ed45eb22716a67505a3af
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadConsoleOutputA
GetFileType
CancelIo
GetPrivateProfileStringW
GetUserDefaultLangID
ExitThread
GetModuleHandleA
GetCommModemStatus
LoadResource
SetCommMask
EraseTape
SetHandleCount
ConnectNamedPipe
GetHandleInformation
EndUpdateResourceA
WriteConsoleOutputCharacterA
SetConsoleTitleA
CreateDirectoryExA
GetDriveTypeA
GenerateConsoleCtrlEvent
VirtualAllocEx
WriteFile
lstrcatW
FreeLibrary
SetStdHandle
SearchPathW
SetSystemTime
OutputDebugStringA
GetProfileIntA
GlobalUnlock
EnumCalendarInfoA
lstrcpyA
LocalLock
ClearCommBreak
CloseHandle
GetProcessHeap
Beep
WritePrivateProfileSectionA
CreateNamedPipeW
TlsGetValue
EnumSystemCodePagesA
GetCurrentDirectoryW
_llseek
CopyFileExW
_lopen
ReadConsoleInputW
GetPrivateProfileSectionW
GlobalFindAtomA
SuspendThread
GetThreadContext
IsDBCSLeadByteEx
CreateWaitableTimerA
GetSystemInfo
ExpandEnvironmentStringsW
TryEnterCriticalSection
PeekConsoleInputW
FindFirstFileA
GetSystemTime
VirtualProtect
FlushFileBuffers
SetErrorMode
FreeLibraryAndExitThread
SetConsoleMode
GetFullPathNameA
FindFirstFileExW
IsBadStringPtrA
LCMapStringA
_lread
GetCPInfo
GetTapeStatus
FlushConsoleInputBuffer
EnumSystemCodePagesW
lstrcpynA
GetUserDefaultLCID
SetTimeZoneInformation
GlobalDeleteAtom
SetFileAttributesA
LocalReAlloc
CreateEventA
DuplicateHandle
DosDateTimeToFileTime
GetShortPathNameA
FindCloseChangeNotification
GetCommandLineA
lstrlenA
VirtualAlloc
GetStartupInfoA
ExitProcess
user32
MessageBoxA
GetWindowLongA
GetWindow
GrayStringW
DefWindowProcA
keybd_event
ChangeMenuA
IsCharUpperA
MapVirtualKeyW
ClientToScreen
UnregisterHotKey
CreatePopupMenu
GetScrollRange
AdjustWindowRectEx
LoadStringW
SendDlgItemMessageA
DragDetect
RegisterClipboardFormatA
GetWindowPlacement
CopyIcon
SetSysColors
LoadCursorW
DefDlgProcA
DeleteMenu
GetWindowLongW
KillTimer
GetMenuItemCount
GetCursor
SystemParametersInfoW
EndDialog
GetMessagePos
GetKeyNameTextA
GetWindowTextA
SetThreadDesktop
GetClassLongW
GetClientRect
CloseWindow
CallNextHookEx
GetMessageA
CloseDesktop
GetProcessDefaultLayout
IsCharAlphaNumericW
SetScrollRange
SetWindowTextW
SetWindowLongA
GetPropW
IsClipboardFormatAvailable
LoadKeyboardLayoutA
EnumDisplaySettingsExW
TileWindows
LoadImageW
CharNextW
GetScrollBarInfo
CharPrevW
CreateDialogParamA
HiliteMenuItem
gdi32
GetWindowExtEx
GetDeviceCaps
GetPixel
GetDIBColorTable
GetTextExtentPointW
GetViewportOrgEx
advapi32
RegEnumKeyExA
ReportEventA
SetFileSecurityA
GetSidSubAuthority
GetSecurityDescriptorOwner
ObjectDeleteAuditAlarmW
AllocateAndInitializeSid
GetSecurityDescriptorControl
GetServiceDisplayNameA
CryptGetProvParam
shell32
SHLoadInProc
SHGetSpecialFolderPathW
ShellExecuteA
ole32
CoInitializeEx
OleIsRunning
CoMarshalInterThreadInterfaceInStream
OleCreateMenuDescriptor
ReadClassStm
CoFileTimeNow
StgOpenStorage
OleConvertIStorageToOLESTREAM
oleaut32
VariantCopy
VariantChangeType
SafeArrayPutElement
SafeArrayGetElement
SysStringLen
QueryPathOfRegTypeLi
SetErrorInfo
shlwapi
StrFormatByteSizeA
SHAutoComplete
StrFormatByteSizeW
StrCpyNW
UrlGetPartA
PathRemoveBackslashA
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 252KB - Virtual size: 251KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE