Static task
static1
Behavioral task
behavioral1
Sample
8ab1dfbac1b344a44ca21e7479775a355c8c61bd1da85031d0242de6ee07adbe.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8ab1dfbac1b344a44ca21e7479775a355c8c61bd1da85031d0242de6ee07adbe.exe
Resource
win10v2004-20221111-en
General
-
Target
8ab1dfbac1b344a44ca21e7479775a355c8c61bd1da85031d0242de6ee07adbe
-
Size
87KB
-
MD5
fcbaad8e08900e07b70b959958e6ce56
-
SHA1
ed8555603dd80ff7a3d3f404191511d64d463268
-
SHA256
8ab1dfbac1b344a44ca21e7479775a355c8c61bd1da85031d0242de6ee07adbe
-
SHA512
ff6da71f961c9702ee684c20c30de8e2c461125b2fee7c84c6fd4231ab14fc0d362aad6173a730fb63fb2e3ebfa680d1351060dca9f362699ce3f86c6ac3b82f
-
SSDEEP
1536:1iYG0F4h3irWfMIQoeeVDGRRd1U6sZ74lZgtasmVfA7VRHf:0YGmMWWD5c/FlZ8YW77
Malware Config
Signatures
Files
-
8ab1dfbac1b344a44ca21e7479775a355c8c61bd1da85031d0242de6ee07adbe.exe windows x86
d7ddde62f42c89fbabb7dbe6d4656cfd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
GetFileSize
ReadFile
SetFilePointer
CreateFileA
TerminateProcess
ResumeThread
SetThreadContext
WriteProcessMemory
VirtualAllocEx
ReadProcessMemory
GetThreadContext
CreateProcessA
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
HeapAlloc
GetProcessHeap
Sections
.text Size: 19KB - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE