Static task
static1
Behavioral task
behavioral1
Sample
ce135a4d91a0cef641cfad82e24a1b3a1c2234d8053e3dec12c5c1b962cc5ac8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ce135a4d91a0cef641cfad82e24a1b3a1c2234d8053e3dec12c5c1b962cc5ac8.exe
Resource
win10v2004-20220812-en
General
-
Target
ce135a4d91a0cef641cfad82e24a1b3a1c2234d8053e3dec12c5c1b962cc5ac8
-
Size
308KB
-
MD5
4e38df34c69d84d1eee21e6955ddf321
-
SHA1
6bf58ad0adb380dee3ff595d9885ba365e532a7b
-
SHA256
ce135a4d91a0cef641cfad82e24a1b3a1c2234d8053e3dec12c5c1b962cc5ac8
-
SHA512
46c5828633c004715683037c279a1410ae1100ca7d0ef88e56eaa274e1c17de2f3990dff4e64cf27f79a7f6ba5a75ebc3648359489d69847371f19bea9e3370c
-
SSDEEP
6144:KycYlko/biD40rVxA3TrDnTNWATWJEZULD01nHAuHNdY2knX:KycYl1/uDHRxADrlnZso1gGYnX
Malware Config
Signatures
Files
-
ce135a4d91a0cef641cfad82e24a1b3a1c2234d8053e3dec12c5c1b962cc5ac8.exe windows x86
8d9a02b45094f03383763c1a0ba485d5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStartupInfoA
GetCurrentProcessId
CreateMutexW
HeapReAlloc
FreeEnvironmentStringsW
SetStdHandle
TlsAlloc
FatalAppExitA
GetTickCount
SetHandleCount
GetStdHandle
FlushFileBuffers
QueryPerformanceCounter
GetModuleHandleA
SetLastError
GetVersionExA
CloseHandle
GetLocaleInfoW
HeapFree
SetUnhandledExceptionFilter
GetModuleFileNameW
TerminateProcess
GetCommandLineW
WideCharToMultiByte
GetLocaleInfoA
VirtualAlloc
MultiByteToWideChar
GetUserDefaultLCID
GetTimeFormatA
FreeEnvironmentStringsA
IsDebuggerPresent
GetCurrentProcess
TlsFree
CompareStringA
SetEnvironmentVariableA
GetCurrentThreadId
GetProcessHeap
VirtualFree
GetFileType
InterlockedIncrement
GetEnvironmentStrings
LeaveCriticalSection
GetCommandLineA
TlsGetValue
GetStringTypeA
GetTimeZoneInformation
GetConsoleCP
HeapSize
WriteConsoleW
GetCPInfo
GetCurrentThread
LCMapStringA
GetACP
RtlUnwind
UnhandledExceptionFilter
WriteFile
FreeLibrary
InitializeCriticalSection
GetLastError
GetDateFormatA
GetStartupInfoW
WriteConsoleA
SetConsoleCtrlHandler
EnterCriticalSection
GetStringTypeW
GetConsoleMode
HeapCreate
InterlockedExchange
GetEnvironmentStringsW
TlsSetValue
GetOEMCP
GetSystemTimeAsFileTime
GetModuleHandleW
SetFilePointer
CreateFileA
DeleteCriticalSection
ReadFile
InterlockedDecrement
GetProcAddress
GetConsoleOutputCP
VirtualQuery
HeapAlloc
HeapDestroy
LCMapStringW
ExitProcess
Sleep
CompareStringW
IsValidCodePage
IsValidLocale
GetModuleFileNameA
LoadLibraryA
shlwapi
PathStripPathW
PathIsDirectoryW
PathRemoveBackslashW
PathIsRelativeW
PathAddBackslashW
winspool.drv
DocumentPropertiesA
ClosePrinter
ord204
advapi32
RegCreateKeyExA
RegDeleteKeyA
RegEnumKeyA
RegDeleteValueA
RegNotifyChangeKeyValue
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
ole32
CreateItemMoniker
CoTaskMemFree
CreateBindCtx
CreateDataAdviseHolder
CLSIDFromProgID
StgCreateDocfile
CoDisconnectObject
OleCreateFromData
CLSIDFromString
CoTaskMemAlloc
OleLockRunning
OleSetContainedObject
oleaut32
LoadTypeLi
shell32
ShellExecuteA
SHFileOperationA
ord155
SHGetDesktopFolder
user32
CreateWindowExA
SetParent
BringWindowToTop
GetDC
GetDlgCtrlID
LoadIconW
EndDeferWindowPos
RegisterClipboardFormatW
DrawMenuBar
ReleaseCapture
CreateWindowExW
DefWindowProcW
GetClientRect
DestroyWindow
BeginDeferWindowPos
TranslateMessage
ChildWindowFromPointEx
GetParent
OffsetRect
IntersectRect
IsIconic
DrawFocusRect
MessageBoxW
GetDlgItem
ShowWindow
RegisterClassExW
GetDesktopWindow
InflateRect
FlashWindow
WindowFromPoint
FillRect
MapWindowPoints
CallWindowProcW
GetActiveWindow
GetSystemMetrics
GetSysColor
DispatchMessageW
GetMessagePos
DestroyMenu
ReleaseDC
ScrollWindowEx
SetWindowTextW
GetForegroundWindow
GetWindowThreadProcessId
RegisterClassW
SetCursor
PtInRect
Sections
.text Size: 80KB - Virtual size: 79KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 92KB - Virtual size: 90KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 60KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 72KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ