Static task
static1
Behavioral task
behavioral1
Sample
00ab3dee4afa80932a5fc1c236a0d46bc8b0358b80b9d4124a22e680426bf57e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
00ab3dee4afa80932a5fc1c236a0d46bc8b0358b80b9d4124a22e680426bf57e.exe
Resource
win10v2004-20221111-en
General
-
Target
00ab3dee4afa80932a5fc1c236a0d46bc8b0358b80b9d4124a22e680426bf57e
-
Size
4.6MB
-
MD5
527ad91aa4b89599f9843e1ad36fd1e0
-
SHA1
b2a627846e87e6f6833c4b1d26f1a74f0acebbfb
-
SHA256
00ab3dee4afa80932a5fc1c236a0d46bc8b0358b80b9d4124a22e680426bf57e
-
SHA512
77eb12d2f6251952375fa224e9089afe68f2e32eb0d35fbb6175039c6d6c7e7461ee6b2c3a3b532253436cd43e65f031ad050819206c95681886b17885833eaf
-
SSDEEP
98304:wGV6r1Pk/8lzhFm3epQiBKtWtFyHaOgoUv3he9wI7UIHMCWpzlj7:2rZkklzhFm3epQiBKtyFyHDDUv3hLIrM
Malware Config
Signatures
Files
-
00ab3dee4afa80932a5fc1c236a0d46bc8b0358b80b9d4124a22e680426bf57e.exe windows x86
31824eab5f4940cbccb2c77c5c90b64f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
CreateFileMappingA
GetFileSize
MapViewOfFile
UnmapViewOfFile
GetLastError
LoadLibraryExA
lstrcpynA
SizeofResource
GetTempFileNameA
GetDriveTypeA
lstrlenA
GetTempPathA
MoveFileA
Heap32ListNext
Heap32Next
CreateDirectoryA
FindFirstFileA
FindClose
Heap32First
Heap32ListFirst
GetThreadContext
RemoveDirectoryA
CopyFileA
SetThreadContext
FindNextFileA
GetFileAttributesExA
GetDateFormatA
FileTimeToSystemTime
GetTimeFormatA
GetSystemDefaultLCID
Beep
ContinueDebugEvent
WaitForDebugEvent
CreateProcessA
QueryPerformanceFrequency
QueryPerformanceCounter
GetCurrentDirectoryA
CreateToolhelp32Snapshot
Module32Next
CreateFileW
Module32First
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetLocaleInfoW
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
LockResource
GetStringTypeA
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetTickCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
FlushFileBuffers
GetFileType
SetHandleCount
GetStdHandle
GetConsoleMode
GetConsoleCP
IsValidCodePage
GetOEMCP
GetACP
HeapSize
HeapCreate
HeapDestroy
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
LCMapStringW
LCMapStringA
GetCPInfo
RtlUnwind
RaiseException
GetStartupInfoA
GetProcessHeap
GetCommandLineA
ExitProcess
GetSystemTimeAsFileTime
HeapFree
HeapAlloc
HeapReAlloc
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
MultiByteToWideChar
InterlockedExchange
InterlockedDecrement
InterlockedIncrement
WideCharToMultiByte
FindResourceA
LoadResource
SetFilePointer
GlobalAlloc
GlobalFree
GlobalUnlock
GlobalLock
SetFilePointerEx
GetVersionExA
GlobalFlags
GetFileAttributesA
GetPrivateProfileStringA
FreeLibrary
SetProcessShutdownParameters
LoadLibraryA
GetCurrentProcess
LocalFree
WritePrivateProfileStringA
GetPrivateProfileIntA
MulDiv
VirtualQueryEx
VirtualAllocEx
CreateRemoteThread
VirtualProtectEx
SuspendThread
ExitThread
GetCurrentThreadId
GetModuleFileNameA
GetExitCodeProcess
GetExitCodeThread
VirtualFreeEx
OpenThread
Sleep
IsBadWritePtr
TerminateThread
WaitForSingleObject
lstrcmpA
DeleteCriticalSection
InitializeCriticalSection
CreateThread
DeleteFileA
lstrcmpiA
ResumeThread
WriteFile
GetCurrentThread
SetThreadPriority
GetThreadPriority
VirtualProtect
lstrcpyA
TryEnterCriticalSection
VirtualAlloc
GetSystemInfo
GetSystemDirectoryA
ReadFile
GetFileSizeEx
CreateFileA
GetWindowsDirectoryA
GetCurrentProcessId
GetModuleHandleA
EnterCriticalSection
IsBadReadPtr
CloseHandle
VirtualFree
GetStringTypeW
LeaveCriticalSection
SetEndOfFile
user32
GetFocus
FindWindowExA
GetSysColorBrush
IsIconic
IsZoomed
EnumChildWindows
EnableScrollBar
ShowScrollBar
IntersectRect
SetCursor
GetWindowDC
IsWindowEnabled
InflateRect
GetMenuItemCount
RemoveMenu
AdjustWindowRectEx
GetComboBoxInfo
GetWindow
GetClassNameA
SetParent
CreateMenu
GetMenuItemInfoA
SetRectEmpty
CallWindowProcA
ShowWindowAsync
DrawTextA
GetKeyState
UnhookWindowsHookEx
ReleaseCapture
TrackMouseEvent
EnableWindow
CheckDlgButton
SetPropA
SetWindowTextA
GetPropA
CallNextHookEx
SetWindowsHookExA
GetSysColor
EndPaint
BeginPaint
GetCursorPos
IsWindowVisible
AppendMenuA
SetCapture
OffsetRect
ScrollWindow
SetScrollInfo
GetScrollInfo
FindWindowA
SetForegroundWindow
SendDlgItemMessageA
SetCursorPos
CloseWindow
SetActiveWindow
IsDlgButtonChecked
SendMessageA
RemovePropA
wsprintfW
UnregisterHotKey
RegisterHotKey
GetAsyncKeyState
DrawEdge
ClipCursor
SetCaretPos
DestroyCaret
HideCaret
CreateCaret
RegisterClipboardFormatA
GetDlgItemInt
SetDlgItemInt
EnumWindows
GetWindowLongW
GetActiveWindow
GetDlgItem
DialogBoxParamA
GetWindowLongA
MessageBoxA
SetWindowLongA
EndDialog
SetFocus
WaitMessage
GetMessageA
TranslateAcceleratorA
PeekMessageA
GetForegroundWindow
LoadAcceleratorsA
TranslateMessage
DispatchMessageA
RedrawWindow
PostMessageA
UpdateWindow
CopyRect
IsWindow
CheckMenuItem
GetParent
LoadBitmapA
ShowWindow
GetMenu
CreateDialogIndirectParamA
MoveWindow
GetWindowRect
GetSubMenu
ShowCaret
ScreenToClient
SetWindowPos
SetTimer
KillTimer
DrawCaption
VkKeyScanA
GetSystemMetrics
GetClipboardData
EmptyClipboard
EnumClipboardFormats
OpenClipboard
SetClipboardData
CloseClipboard
GetWindowTextLengthA
InsertMenuA
ModifyMenuA
PtInRect
DeleteMenu
LoadMenuA
SendMessageW
ReleaseDC
GetDC
CreateDialogParamA
DestroyWindow
SendNotifyMessageA
GetWindowTextA
TrackPopupMenu
DrawMenuBar
PostQuitMessage
DestroyIcon
DefWindowProcA
RegisterClassExA
LoadCursorA
SetMenuItemInfoA
DestroyMenu
GetClientRect
InvalidateRect
LoadIconA
EnableMenuItem
CreateWindowExA
ClientToScreen
gdi32
CreatePen
MoveToEx
SelectClipRgn
GetTextColor
GetBkColor
GetPixel
GetStockObject
EnumFontFamiliesExA
GetTextFaceA
ExcludeClipRect
LineTo
SetBkMode
CreateBrushIndirect
PatBlt
SetBrushOrgEx
CreateBitmap
Rectangle
SetPixelV
CreatePatternBrush
CreateSolidBrush
SetTextColor
SetBkColor
ExtTextOutA
CreateFontIndirectA
GetCharABCWidthsFloatA
GetTextMetricsA
BitBlt
GetDIBits
CreateCompatibleBitmap
GetDeviceCaps
CreateCompatibleDC
DeleteDC
StretchBlt
SetPixel
SelectObject
DeleteObject
comdlg32
GetSaveFileNameA
ChooseColorA
ChooseFontA
GetOpenFileNameA
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueA
StartServiceA
OpenSCManagerA
ControlService
DeleteService
OpenServiceA
CreateServiceA
CloseServiceHandle
RegQueryValueExA
RegOpenKeyExA
OpenProcessToken
shell32
ShellExecuteA
SHGetPathFromIDListA
SHBrowseForFolderA
ShellAboutW
SHAppBarMessage
ole32
OleInitialize
OleUninitialize
shlwapi
PathRenameExtensionA
PathIsURLA
PathRemoveFileSpecA
PathGetDriveNumberA
PathRemoveBlanksA
PathIsDirectoryA
StrDupA
StrRChrA
PathCanonicalizeA
PathRemoveBackslashA
PathQuoteSpacesA
PathCombineA
PathRemoveExtensionA
PathRelativePathToA
PathRemoveArgsA
ws2_32
WSAStartup
WSACleanup
getservbyname
ioctlsocket
socket
getsockopt
send
getpeername
inet_ntoa
bind
WSAGetLastError
recv
getprotobynumber
sendto
gethostname
closesocket
shutdown
inet_addr
gethostbyname
getservbyport
accept
setsockopt
getprotobyname
htonl
select
htons
recvfrom
getsockname
gethostbyaddr
listen
connect
winmm
timeGetTime
psapi
GetModuleFileNameExA
comctl32
ord17
ImageList_ReplaceIcon
ImageList_Create
ImageList_AddMasked
ord8
ImageList_Add
ImageList_Destroy
ImageList_DragLeave
ImageList_DragShowNolock
ImageList_DragMove
ImageList_EndDrag
ImageList_BeginDrag
ImageList_DragEnter
imagehlp
MapAndLoad
CheckSumMappedFile
UnMapAndLoad
zlib1
inflate
gzgets
gzread
gzwrite
gzgetc
gzflush
inflateInit_
gzputc
gzprintf
compress
uncompress
gzerror
gzseek
gzopen
deflate
deflateEnd
gzeof
gzsetparams
gzrewind
gztell
deflateInit_
compress2
inflateEnd
gzclose
gzputs
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
.text Size: 2.6MB - Virtual size: 2.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 748KB - Virtual size: 744KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 132KB - Virtual size: 152KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1016KB - Virtual size: 1015KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
gmslfc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 88KB - Virtual size: 86KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE