Static task
static1
Behavioral task
behavioral1
Sample
ab78a707b1b193b4e9234fed14196accfc5274ce74f7f503670ce4aee8c4c2ff.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ab78a707b1b193b4e9234fed14196accfc5274ce74f7f503670ce4aee8c4c2ff.exe
Resource
win10v2004-20220812-en
General
-
Target
ab78a707b1b193b4e9234fed14196accfc5274ce74f7f503670ce4aee8c4c2ff
-
Size
753KB
-
MD5
88bc0176378d8e91e5ad33808b9ac653
-
SHA1
9c0e7038e8c5eeb1f77ce48a47ed3b748e540222
-
SHA256
ab78a707b1b193b4e9234fed14196accfc5274ce74f7f503670ce4aee8c4c2ff
-
SHA512
2b212b8e4b25f606407d06f4b65629e7c96e9080ff13fcf1a86fa935f06b89cbc81b91af5cf178501534682838ddbe4b0815a2a139ab7ebe988c46f81955e3b9
-
SSDEEP
12288:BsxVHFVj9awQvNaE6wOIK802tfmqQnjCfwRqR0ENgEfTJLX3+ldI:BAHF19dqywO4hqjaZN1fTROfI
Malware Config
Signatures
Files
-
ab78a707b1b193b4e9234fed14196accfc5274ce74f7f503670ce4aee8c4c2ff.exe windows x86
c7c4671a93ae8719c38ae5fb1b5651f8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
SetTextColor
GetStockObject
GetDeviceCaps
DeleteObject
BitBlt
SelectObject
oleaut32
SysAllocString
SysFreeString
SysStringLen
VariantClear
kernel32
GetStdHandle
GetConsoleOutputCP
FileTimeToSystemTime
GetFileAttributesA
GetCurrentThreadId
GetTickCount
GetCurrentThread
GetVersion
GetCommandLineA
GetModuleHandleA
GetCurrentProcessId
GetLastError
ExitProcess
HeapAlloc
GetProcessHeap
ResetEvent
GetOEMCP
VirtualAlloc
Sleep
VirtualFree
HeapCreate
CreateProcessA
SetStdHandle
FindResourceA
GetModuleHandleW
GetACP
CloseHandle
ReadFile
TlsFree
MapViewOfFile
RaiseException
HeapSize
GetCPInfo
LockResource
GetEnvironmentStrings
CreateProcessW
GetShortPathNameA
RemoveDirectoryA
GlobalAlloc
GlobalUnlock
GetEnvironmentStringsW
LCMapStringA
FindResourceW
GetConsoleCP
GlobalFree
lstrlenA
GetSystemInfo
LCMapStringW
LeaveCriticalSection
CreateFileA
GetExitCodeProcess
GetFileType
CreateEventA
CreateFileW
CreateEventW
GlobalLock
WaitForMultipleObjects
FindFirstFileW
CreateFileMappingA
CompareStringA
lstrcpyA
FindFirstFileA
lstrcmpA
CompareStringW
GetProcAddress
DeleteFileW
CreateDirectoryA
GetFileSize
GetStartupInfoA
LoadLibraryA
FlushFileBuffers
TlsAlloc
IsBadWritePtr
QueryPerformanceCounter
SetEvent
lstrcmpiA
SetHandleCount
EnterCriticalSection
HeapFree
LoadLibraryExW
InterlockedIncrement
GetLocaleInfoA
SetEndOfFile
VirtualQuery
WriteConsoleA
TerminateProcess
SetEnvironmentVariableA
GetSystemDirectoryA
SetUnhandledExceptionFilter
TlsSetValue
CreateThread
SetFilePointer
CreateMutexA
MultiByteToWideChar
TlsGetValue
UnhandledExceptionFilter
GetPrivateProfileStringA
GetModuleFileNameA
GetVersionExA
IsDebuggerPresent
GetModuleFileNameW
GetEnvironmentVariableA
SetLastError
FormatMessageA
InterlockedDecrement
FindClose
LoadResource
InitializeCriticalSection
LocalFree
FreeLibrary
GetFullPathNameA
GetStringTypeW
HeapReAlloc
GetSystemTimeAsFileTime
WriteFile
InterlockedExchange
GetStringTypeA
LoadLibraryW
WideCharToMultiByte
GetTempPathA
FreeEnvironmentStringsW
lstrcatA
GetCurrentProcess
DeleteCriticalSection
FreeEnvironmentStringsA
GetLocalTime
GetFileAttributesW
HeapDestroy
GetDriveTypeA
WaitForSingleObject
user32
SetCursor
GetClientRect
InvalidateRect
IsWindowVisible
SystemParametersInfoA
GetSysColor
MessageBoxA
GetDesktopWindow
LoadIconA
LoadCursorA
ScreenToClient
CheckMenuItem
SetWindowTextA
ReleaseCapture
PostMessageA
GetWindowRect
DefWindowProcA
BeginPaint
SetFocus
FillRect
SetTimer
RegisterClassA
IsIconic
IsWindowEnabled
TranslateMessage
EnableWindow
ShowWindow
GetMessageA
DestroyWindow
ClientToScreen
DrawTextA
GetDC
PeekMessageA
EndPaint
DispatchMessageA
IsWindow
ReleaseDC
PostQuitMessage
SetForegroundWindow
Sections
.text Size: 717KB - Virtual size: 1.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ