Static task
static1
Behavioral task
behavioral1
Sample
abbe7d13b13ea4315543bdad187f14b3.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
abbe7d13b13ea4315543bdad187f14b3.dll
Resource
win10v2004-20230220-en
General
-
Target
abbe7d13b13ea4315543bdad187f14b3.bin
-
Size
126KB
-
MD5
abbe7d13b13ea4315543bdad187f14b3
-
SHA1
11b82826ec01aeec44e5e2504935b6aaccf51cac
-
SHA256
4ffc7f65e16ce59ff9e6a504f88e0cf56b225c0eb2cf8ec578b3e9d40d9bd898
-
SHA512
16776e72d0c8e304a355967caa9150b918ad0648cab860852c6907eaa60ecd321630ce871c89ad882df334bb1c54e9912d510af5bdc6cae5a93620a4e0090f62
-
SSDEEP
3072:0aZyNykBgIGsU4jfIwcy8MzmRU6cj6/m0CypHb3:0aZyNyHJ4jNd8ry6K6Dj
Malware Config
Signatures
Files
-
abbe7d13b13ea4315543bdad187f14b3.bin.dll windows x86
e0f3dd372d3e0588d81fd889ee276951
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
VirtualProtect
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
CreateFileA
PeekNamedPipe
WriteFile
ReadFile
DisconnectNamedPipe
GetLastError
SetNamedPipeHandleState
CloseHandle
lstrcmpA
GetTickCount
CreateThread
lstrcpyA
WaitForSingleObject
GetCurrentProcessId
TerminateThread
GetComputerNameA
GetThreadContext
SetThreadContext
lstrlenA
lstrcpynA
GetCurrentProcess
TerminateProcess
VirtualAllocEx
VirtualAlloc
WriteProcessMemory
ResumeThread
InterlockedDecrement
GlobalAlloc
WideCharToMultiByte
GetComputerNameExA
lstrcatA
MultiByteToWideChar
lstrlenW
GlobalFree
HeapSize
LocalFree
OpenMutexA
CreateMutexA
GetCurrentThreadId
GetSystemTimeAsFileTime
GetProcAddress
lstrcmpiA
IsBadReadPtr
GetProcessHeap
VirtualFree
Sleep
HeapFree
HeapAlloc
HeapReAlloc
FreeLibrary
GetLocalTime
GetCommandLineA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
LCMapStringW
GetStringTypeW
CreateFileW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
FlushFileBuffers
WriteConsoleW
IsProcessorFeaturePresent
SetStdHandle
LoadLibraryW
IsDebuggerPresent
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SetFilePointer
GetStartupInfoW
GetFileType
SetHandleCount
GetConsoleMode
GetConsoleCP
RtlUnwind
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
GetStdHandle
ExitProcess
GetModuleHandleW
HeapDestroy
HeapCreate
RaiseException
EncodePointer
DecodePointer
user32
wsprintfA
advapi32
GetUserNameA
RevertToSelf
ImpersonateLoggedOnUser
CreateProcessAsUserA
ole32
CoInitializeSecurity
CoUninitialize
CoSetProxyBlanket
CoCreateInstance
CoInitializeEx
oleaut32
SysFreeString
VariantClear
SysAllocString
wininet
HttpSendRequestExA
InternetConnectA
InternetWriteFile
InternetSetOptionW
HttpQueryInfoW
HttpOpenRequestA
HttpSendRequestA
InternetOpenA
HttpEndRequestW
InternetCloseHandle
InternetReadFileExA
InternetQueryOptionW
InternetCrackUrlA
urlmon
ObtainUserAgentString
ws2_32
WSAStartup
inet_addr
WSAGetLastError
htons
inet_ntoa
recv
bind
socket
closesocket
gethostbyname
send
accept
connect
ioctlsocket
sendto
shutdown
recvfrom
getsockname
gethostname
ntohs
wtsapi32
WTSEnumerateSessionsA
WTSQuerySessionInformationA
WTSQueryUserToken
WTSFreeMemory
iphlpapi
GetAdaptersInfo
Sections
.text Size: 93KB - Virtual size: 93KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 728B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ