Static task
static1
Behavioral task
behavioral1
Sample
97ab4ba0638f2dcc3d7e1ba8abb2584678401d0075695869ee6103368dc8ef5e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
97ab4ba0638f2dcc3d7e1ba8abb2584678401d0075695869ee6103368dc8ef5e.exe
Resource
win10v2004-20220901-en
General
-
Target
97ab4ba0638f2dcc3d7e1ba8abb2584678401d0075695869ee6103368dc8ef5e
-
Size
110KB
-
MD5
48ff24102faad97f2769b2f8f06498f2
-
SHA1
d3ee3b217cc70b299764b2b037d23d51e516465b
-
SHA256
97ab4ba0638f2dcc3d7e1ba8abb2584678401d0075695869ee6103368dc8ef5e
-
SHA512
cca78b814a204a401816d8ae97e38b08858ba4c4f24d48501b10d79798697168bb918b893b1bcea9d968fb43753e23c755e7836d48a63f7efa0b2d30612a618d
-
SSDEEP
1536:PXj2MBb4v1sAEIP/1jw1lOdohFDS0CPOOPllzUlnxWiNsLPfMp5c:PXjDCvehI+BhFDSKSUi4sLPfM4
Malware Config
Signatures
Files
-
97ab4ba0638f2dcc3d7e1ba8abb2584678401d0075695869ee6103368dc8ef5e.exe windows x86
2650a2b8e0a8345d2d7ebc4e9beaaf33
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
GetLastError
InterlockedDecrement
HeapCreate
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
GetConsoleCP
GetConsoleMode
EnterCriticalSection
LeaveCriticalSection
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapFree
Sleep
MultiByteToWideChar
InterlockedExchange
LoadLibraryW
RtlUnwind
SetStdHandle
WriteConsoleW
LCMapStringW
GetStringTypeW
HeapAlloc
HeapReAlloc
IsProcessorFeaturePresent
HeapSize
CreateFileW
FlushFileBuffers
MapViewOfFile
UnmapViewOfFile
GlobalAlloc
RaiseException
GlobalFree
OpenFileMappingA
GlobalReAlloc
lstrlenA
lstrcpynA
lstrcatA
lstrlenW
WaitForSingleObject
WriteFile
CreateFileA
GetModuleFileNameW
ReadFile
Thread32First
Thread32Next
VirtualProtect
CreateToolhelp32Snapshot
GetThreadContext
SetThreadContext
InterlockedCompareExchange
FlushInstructionCache
OpenThread
SuspendThread
ResumeThread
VirtualFree
VirtualAlloc
VirtualQuery
ExitProcess
GetModuleHandleW
EncodePointer
DecodePointer
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStartupInfoW
HeapSetInformation
GetCommandLineA
GetFileSize
GetStdHandle
GetTimeZoneInformation
CompareStringW
CreateThread
CloseHandle
OpenProcess
lstrcmpiA
GetTickCount64
GetTickCount
LoadLibraryA
GetProcAddress
SetEvent
FreeLibrary
SetEnvironmentVariableA
user32
SendDlgItemMessageA
GetMessageW
TranslateAcceleratorW
SetWindowLongW
SendMessageTimeoutW
CreateDialogParamW
IsWindow
GetWindowThreadProcessId
DispatchMessageW
GetClassNameA
PostMessageW
SendMessageA
EnumWindows
TranslateMessage
LoadAcceleratorsW
KillTimer
PostQuitMessage
SetTimer
DestroyWindow
SendMessageTimeoutA
FindWindowExA
MessageBoxA
shell32
ShellExecuteExA
Sections
.text Size: 77KB - Virtual size: 77KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 584B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ