Static task
static1
Behavioral task
behavioral1
Sample
01ab3f4f22a69c6c8c3a80c4131fb3e10541ebc8e87a35e4ce7e9d7e21cd4525.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
01ab3f4f22a69c6c8c3a80c4131fb3e10541ebc8e87a35e4ce7e9d7e21cd4525.exe
Resource
win10v2004-20221111-en
General
-
Target
01ab3f4f22a69c6c8c3a80c4131fb3e10541ebc8e87a35e4ce7e9d7e21cd4525
-
Size
22KB
-
MD5
9c5d40c7bc2ab5a8f3de6ee07c1deec4
-
SHA1
5116af9b513148fe90437963de4570bc94b1a882
-
SHA256
01ab3f4f22a69c6c8c3a80c4131fb3e10541ebc8e87a35e4ce7e9d7e21cd4525
-
SHA512
0b7923b033fd5cd4c8ad8d438f3dd9bdef7f2f14d31e2902fb84b5e331653ccbbb4da90966ca723b6d8fa38660fabb351aa5c243809f7da0689f51a89be977fe
-
SSDEEP
384:XFWAlyTtu7CB8u17k3+mC6VNwUKl1HwynIFh:XLCyu17kumHVNwDBW
Malware Config
Signatures
Files
-
01ab3f4f22a69c6c8c3a80c4131fb3e10541ebc8e87a35e4ce7e9d7e21cd4525.exe windows x86
1a861a34af970378e7bb7b97ec0a3e10
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualQuery
lstrlenA
CloseHandle
FindVolumeClose
WriteFile
WaitForMultipleObjects
HeapFree
GetFileTime
ExitThread
CancelIo
CreateDirectoryA
GetFileType
FindClose
GetProcessHeap
GetFileAttributesA
IsBadReadPtr
GetDriveTypeA
GetCurrentDirectoryW
GetModuleFileNameA
GetCommandLineA
GetModuleHandleA
CreateSemaphoreA
LocalSize
HeapCreate
FindVolumeClose
uxtheme
GetThemeBool
GetThemeColor
GetWindowTheme
OpenThemeData
CloseThemeData
GetThemeTextExtent
DrawThemeEdge
DrawThemeBackground
IsThemeActive
SetWindowTheme
GetThemeTextMetrics
CloseThemeData
GetThemeEnumValue
fmifs
Extend
Extend
Extend
Extend
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 10B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE