Static task
static1
Behavioral task
behavioral1
Sample
ab03df1ffdd2f8ba0b9da0b378d60a33f6a43836935c4e47525d80fe61dd1f9d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ab03df1ffdd2f8ba0b9da0b378d60a33f6a43836935c4e47525d80fe61dd1f9d.exe
Resource
win10v2004-20221111-en
General
-
Target
ab03df1ffdd2f8ba0b9da0b378d60a33f6a43836935c4e47525d80fe61dd1f9d
-
Size
63KB
-
MD5
e3087ddbcfc671d88d2b1e1e79552223
-
SHA1
4da5d1fe85a338b5e119f98a14a83731e92fb6bd
-
SHA256
ab03df1ffdd2f8ba0b9da0b378d60a33f6a43836935c4e47525d80fe61dd1f9d
-
SHA512
891eed681346458d6fdd5dab72298bddb7bcf6773727d2f5291d8af4ccdc343cc39a65dbf9cbb31d9d1851f254823224d8ea85f5797f91885a713a4e74834cff
-
SSDEEP
1536:bn4t5mVxOcULmiqlsZA3oqkCrhD4onMwOQkflxAcvEc0a5X:kEVxz3lsZ424hnnMwOn970QX
Malware Config
Signatures
Files
-
ab03df1ffdd2f8ba0b9da0b378d60a33f6a43836935c4e47525d80fe61dd1f9d.exe windows x86
867f229bd27558712da70b6e54a3cf3c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LZCreateFileW
GetWriteWatch
SetThreadUILanguage
GetConsoleCommandHistoryW
FindNextFileA
FreeUserPhysicalPages
DeleteCriticalSection
WriteTapemark
HeapAlloc
GetVolumePathNamesForVolumeNameA
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
rdata Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 49KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE