Static task
static1
Behavioral task
behavioral1
Sample
ab1771260f5b6fe32973f7c9f4544883f46ebdecc9bc584c7613a6f0f4513e62.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ab1771260f5b6fe32973f7c9f4544883f46ebdecc9bc584c7613a6f0f4513e62.exe
Resource
win10v2004-20220901-en
General
-
Target
ab1771260f5b6fe32973f7c9f4544883f46ebdecc9bc584c7613a6f0f4513e62
-
Size
40KB
-
MD5
9a021dbd3152bf4d3dc38d9975f7be67
-
SHA1
28974032218ad790b04b40c98a129710b9f73c61
-
SHA256
ab1771260f5b6fe32973f7c9f4544883f46ebdecc9bc584c7613a6f0f4513e62
-
SHA512
6373fca5e3a33afc7c7c1937c97ffded60d3fc2a6d5a1aa072a486579b0ba1c9f0e1e49551381a87649657c90faa40aa3ad0f5d7e598e1e452c3ddba91fd81f5
-
SSDEEP
384:y1C8keTFa7h92c5yEMuO/RrVPPsN5/Z/MBC+vCYWF9NT7/1HoRGvbieoKjWhf+:y1C8keTbFJVMNpZ/M0PDFb7dHoomenK
Malware Config
Signatures
Files
-
ab1771260f5b6fe32973f7c9f4544883f46ebdecc9bc584c7613a6f0f4513e62.exe windows x86
582df963cc522cafe009110d87ca3018
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetReadFile
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
mfc42
ord1105
ord535
ord941
ord537
ord6930
ord4129
ord6928
ord858
ord4277
ord5683
ord940
ord801
ord6283
ord6282
ord6143
ord541
ord540
ord2818
ord354
ord823
ord6883
ord825
ord665
ord3790
ord860
ord5861
ord1247
ord2820
ord3811
ord837
ord1575
ord4202
ord6877
ord800
ord5216
ord3810
ord920
msvcrt
__CxxFrameHandler
memset
_mbslwr
strcpy
atol
strcmp
sprintf
_splitpath
_ftol
memcpy
free
malloc
realloc
_stricmp
memcmp
_except_handler3
__dllonexit
_onexit
_exit
_XcptFilter
exit
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
_acmdln
_initterm
__getmainargs
__setusermatherr
kernel32
GetStartupInfoA
lstrcatA
lstrcpyA
InitializeCriticalSection
IsDBCSLeadByte
lstrcpynA
LoadLibraryExA
FindResourceA
LoadResource
SizeofResource
FreeLibrary
WideCharToMultiByte
GetModuleHandleA
GetShortPathNameA
MultiByteToWideChar
lstrlenW
GetCommandLineA
lstrcmpiA
WaitForSingleObject
lstrlenA
SetLastError
GetPrivateProfileSectionNamesA
GetPrivateProfileStringA
WritePrivateProfileStringA
GetLastError
MoveFileExA
DeleteFileA
GetCurrentThreadId
GetTickCount
Sleep
CreateProcessA
CreateToolhelp32Snapshot
Process32First
Process32Next
CloseHandle
GetModuleFileNameA
GetWindowsDirectoryA
CreateDirectoryA
WinExec
user32
TranslateMessage
GetMessageA
KillTimer
PostThreadMessageA
SetTimer
CharNextA
LoadStringA
DispatchMessageA
advapi32
RegDeleteKeyA
RegEnumValueA
RegQueryInfoKeyA
RegEnumKeyExA
OpenServiceA
ControlService
QueryServiceStatus
DeleteService
OpenSCManagerA
CreateServiceA
ChangeServiceConfig2A
CloseServiceHandle
RegisterServiceCtrlHandlerA
SetServiceStatus
RegQueryValueExA
RegCloseKey
RegSetValueExA
RegDeleteValueA
StartServiceCtrlDispatcherA
RegOpenKeyExA
RegCreateKeyExA
ole32
CoRevokeClassObject
CoCreateInstance
CoRegisterClassObject
CoTaskMemRealloc
CoTaskMemAlloc
CoTaskMemFree
CoUninitialize
CoInitializeEx
CoInitialize
oleaut32
SysFreeString
SysAllocString
RegisterTypeLi
VarUI4FromStr
LoadTypeLi
Sections
.text Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ