Static task
static1
Behavioral task
behavioral1
Sample
abed54f6f0ee59d0c139093310d0d3c2d360457abcb5c7a915c510d701dc11f9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
abed54f6f0ee59d0c139093310d0d3c2d360457abcb5c7a915c510d701dc11f9.exe
Resource
win10v2004-20220812-en
General
-
Target
abed54f6f0ee59d0c139093310d0d3c2d360457abcb5c7a915c510d701dc11f9
-
Size
303KB
-
MD5
593d1ada380cc7a09afc7084939e4fcb
-
SHA1
f9e36ae83614278c46a973e9f3e4c979126413b4
-
SHA256
abed54f6f0ee59d0c139093310d0d3c2d360457abcb5c7a915c510d701dc11f9
-
SHA512
486b252212884ccd09284635ebdbc100d936979742ba1ea5a22707baddca5cd2e5f958f8aee0c7819f9c2753fb893889408aad58af8072f255df5feecdd97280
-
SSDEEP
6144:e+IhFwMaUhTAylFALFh+OZB1UezSduo4NG5FhhHvBzbMqX:fs7NhTAy8LOOZ3SIlKhH5fMC
Malware Config
Signatures
Files
-
abed54f6f0ee59d0c139093310d0d3c2d360457abcb5c7a915c510d701dc11f9.exe windows x86
2c37c7b221aa00cc74202b35c0097288
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindFirstVolumeA
VirtualAllocEx
lstrcpyW
lstrcpyW
GetStartupInfoW
SetCurrentDirectoryA
lstrcpyW
GetModuleHandleA
lstrcpyW
IsValidLocale
CreateEventA
DeleteFileA
GetVolumePathNameW
IsBadStringPtrA
SetLastError
lstrlenW
GetLocaleInfoA
GetStdHandle
FindNextVolumeA
GetModuleFileNameA
SetConsoleTitleA
lstrcpyW
GetProcessHeap
untfs
Extend
Format
Recover
ChkdskEx
Sections
.text Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.RData Size: 291KB - Virtual size: 290KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.Adata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ