Static task
static1
Behavioral task
behavioral1
Sample
abf787287bca99ffbbba94851e88b782902a465bf72607eeaca95c1ae311550e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
abf787287bca99ffbbba94851e88b782902a465bf72607eeaca95c1ae311550e.exe
Resource
win10v2004-20220812-en
General
-
Target
abf787287bca99ffbbba94851e88b782902a465bf72607eeaca95c1ae311550e
-
Size
92KB
-
MD5
b5d2712e641643de0ffadb440ab6676b
-
SHA1
c92e7355549cdf1767bf650fd78fd9569fc4a6d6
-
SHA256
abf787287bca99ffbbba94851e88b782902a465bf72607eeaca95c1ae311550e
-
SHA512
547cc2b56dcf07fc779cae9b1bea48b8fb418c7b93250c7e9c8f2d8d22848a23870ae1ad37eab4848bec17f8b4c627514383973524fd4f89c60bf3316ccb93be
-
SSDEEP
1536:j9+U0JhvaGj0JiEQyxaaJq1aZaM1pXZwERqruvkqn80V8AwEk2c0:j8U+pby4aJq1KJ1pXZHAGZeEkJ0
Malware Config
Signatures
Files
-
abf787287bca99ffbbba94851e88b782902a465bf72607eeaca95c1ae311550e.exe windows x86
385c69e8c9952dbd0b16e40fa87a8ca0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
RtlCreateHeap
NtTerminateProcess
RtlFreeHeap
RtlInitUnicodeString
RtlDestroyHeap
NtDisplayString
ZwClose
ZwDelayExecution
memcpy
wcscat
ZwReadFile
wcslen
ZwSetInformationFile
memset
RtlAllocateHeap
ZwDeleteFile
ZwOpenFile
ZwQueryInformationFile
wcscpy
NtQuerySystemTime
_snwprintf
strlen
strcpy
RtlUnicodeStringToAnsiString
ZwCreateFile
RtlTimeToTimeFields
ZwWriteFile
strcat
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 940B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.erdata Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE