Static task
static1
Behavioral task
behavioral1
Sample
ab94dcb875f73bc474e03f77ad827fb0659fe94b531e1eab7af1c26bbda33690.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ab94dcb875f73bc474e03f77ad827fb0659fe94b531e1eab7af1c26bbda33690.exe
Resource
win10v2004-20220901-en
General
-
Target
ab94dcb875f73bc474e03f77ad827fb0659fe94b531e1eab7af1c26bbda33690
-
Size
175KB
-
MD5
6ee0c1fc959b376ced4252a868cabc5e
-
SHA1
95e50f96119965972825ca42e401d12fa733b58c
-
SHA256
ab94dcb875f73bc474e03f77ad827fb0659fe94b531e1eab7af1c26bbda33690
-
SHA512
e0c08ddfda3241550c255a2283940e9e9caec5747c9585b6d0da1c250b9a26c5ba8c715de379e64b83239bfdcb089d64581752e3753da2a4f2105d26a58b4a92
-
SSDEEP
3072:vI6E88QrF4hB2E4UVa1rZC43gP1rBcqGAiHR2EpZ5UXAHs5Qw//59cQqpAc/r:g6K24hIUVeOgHRdpXUXwOHO7/
Malware Config
Signatures
Files
-
ab94dcb875f73bc474e03f77ad827fb0659fe94b531e1eab7af1c26bbda33690.exe windows x86
fcc8ec6f14b56dd1dc28b9650e1c3082
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
GetVersionExW
GetThreadLocale
GetLocaleInfoA
GetACP
LoadLibraryA
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetModuleHandleA
lstrlenW
GetEnvironmentVariableA
InterlockedExchange
RaiseException
WideCharToMultiByte
MultiByteToWideChar
CreateProcessA
lstrlenA
GetSystemTimeAsFileTime
GetCurrentProcessId
rpcrt4
RpcStringBindingComposeA
RpcStringFreeA
UuidEqual
RpcBindingFromStringBindingA
UuidCreate
shell32
ShellExecuteExW
SHPropStgWriteMultiple
ShellExecuteW
SHGetSpecialFolderPathW
Sections
.text Size: 95KB - Virtual size: 94KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 984B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 78KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 54B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ