Static task
static1
Behavioral task
behavioral1
Sample
ab1ca87125a5f27e43083a1729ca0889b94c1142c60f5e1f58b17473bff94ff2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ab1ca87125a5f27e43083a1729ca0889b94c1142c60f5e1f58b17473bff94ff2.exe
Resource
win10v2004-20221111-en
General
-
Target
ab1ca87125a5f27e43083a1729ca0889b94c1142c60f5e1f58b17473bff94ff2
-
Size
86KB
-
MD5
6ec069589f500d20cf3da0497260793b
-
SHA1
b2be4467d325e539724e94cbc0dd8135db0d3cf5
-
SHA256
ab1ca87125a5f27e43083a1729ca0889b94c1142c60f5e1f58b17473bff94ff2
-
SHA512
858cf90e2733a88791f5bc129977fb6c001f73cc98c6f1c26fdeb58c5d147b9a6649d97448f2ad2cf53f60f9b6bae988a5ab8fe2a9310c7431a233d8b575555f
-
SSDEEP
1536:wMP5xvb/GUPMWLpbQ/UTO7TkiU9OAA5smA1HLl7RRdqj:TvbeUrcclXM3+m8LlRDqj
Malware Config
Signatures
Files
-
ab1ca87125a5f27e43083a1729ca0889b94c1142c60f5e1f58b17473bff94ff2.exe windows x86
c0132a05b49063a6810b93ff7112c800
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteFile
GlobalFlags
HeapCreate
FindClose
GetCurrentThreadId
GetDriveTypeA
InitializeCriticalSection
GetPrivateProfileStringA
GetFileTime
lstrlenW
CreateEventW
ReleaseMutex
GetEnvironmentVariableW
FindAtomA
GetCurrentProcessId
LoadLibraryW
LocalFree
IsBadStringPtrW
TlsGetValue
ReleaseMutex
user32
CallWindowProcW
DrawTextA
GetSysColor
DispatchMessageA
CreateWindowExA
IsWindow
SetFocus
GetClassInfoA
DrawStateW
GetKeyboardType
GetClientRect
GetSysColor
EndDialog
rastapi
DeviceDone
DeviceDone
DeviceDone
DeviceDone
DeviceDone
clbcatq
DllGetClassObject
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 76KB - Virtual size: 90KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE