Static task
static1
Behavioral task
behavioral1
Sample
abb5ebb55e7c9043f29b2df1ccc817b6a7f525cab60c869ad5a01b42d3e51847.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
abb5ebb55e7c9043f29b2df1ccc817b6a7f525cab60c869ad5a01b42d3e51847.exe
Resource
win10v2004-20221111-en
General
-
Target
abb5ebb55e7c9043f29b2df1ccc817b6a7f525cab60c869ad5a01b42d3e51847
-
Size
119KB
-
MD5
672606359ab863193629d3ca89b819c9
-
SHA1
be13b5cf5b661d62ec6eca50b95e91b91bc1b743
-
SHA256
abb5ebb55e7c9043f29b2df1ccc817b6a7f525cab60c869ad5a01b42d3e51847
-
SHA512
4b5fc0d7715841966d9a92619f1a750d57b2aff95f34380057f125f9ad09a2e2c07cdc93137aa2dbbd477609aa81e9adf538a6f7db8c9e0f4449110116c9fc62
-
SSDEEP
3072:K/Eo5ME9l5ze8h2WRko8k18LS8zJdabxna:WrrNz9Rkf+8LhJEbx
Malware Config
Signatures
Files
-
abb5ebb55e7c9043f29b2df1ccc817b6a7f525cab60c869ad5a01b42d3e51847.exe windows x86
8a2253f8e3d2ebd404f1b8e6e98a5bd1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
IsDebuggerPresent
FlushFileBuffers
GetWindowsDirectoryW
GetProcAddress
GetCurrentProcess
GetThreadContext
GetProcessPriorityBoost
Module32First
GetComputerNameW
ContinueDebugEvent
GetSystemDefaultLangID
GetModuleHandleA
GetStartupInfoW
GetUserDefaultLCID
WriteFile
Process32First
GetStartupInfoA
GetWindowsDirectoryA
SetProcessPriorityBoost
GetAtomNameA
Module32Next
GetSystemTimes
GetConsoleCP
FindAtomA
GetSystemTimeAsFileTime
LoadLibraryExA
GetProcessWorkingSetSize
CreateToolhelp32Snapshot
GetFileSize
DisableThreadLibraryCalls
SetThreadPriorityBoost
CancelIo
GetProcessTimes
GetThreadPriorityBoost
SetEvent
FreeConsole
SetEnvironmentVariableA
CloseHandle
GetProcessHeap
OutputDebugStringA
GetSystemDefaultLCID
GetCurrentProcessId
GetModuleFileNameW
LocalFlags
IsProcessorFeaturePresent
FlushConsoleInputBuffer
GetConsoleTitleW
CreateDirectoryW
GlobalFlags
MoveFileW
Process32Next
GetPriorityClass
WaitForSingleObject
CreateEventA
ExitProcess
ReadFile
VirtualAlloc
LoadLibraryA
IsBadReadPtr
VirtualProtect
VirtualFree
CreateFileW
GetHandleInformation
GetCurrentThreadId
GetThreadTimes
user32
CharUpperA
GetLastActivePopup
GetDialogBaseUnits
GetWindowThreadProcessId
GetCapture
GetSystemMetrics
GetCaretBlinkTime
AnyPopup
GetProcessDefaultLayout
IsIconic
GetParent
GetKeyboardType
CloseClipboard
ShowCaret
GetInputState
IsMenu
DestroyCaret
ShowCursor
PostQuitMessage
DestroyWindow
DefWindowProcA
DispatchMessageA
TranslateMessage
GetMessageA
UpdateWindow
ShowWindow
MessageBoxA
CreateWindowExA
RegisterClassExA
LoadCursorA
LoadIconA
GetMenu
BringWindowToTop
GetMessagePos
GetDoubleClickTime
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.kpn Size: 71KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 468KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ