Static task
static1
Behavioral task
behavioral1
Sample
ce70228330b3039538e1b47672533444350d9bb31a64766ecc45cd273b6c92c8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ce70228330b3039538e1b47672533444350d9bb31a64766ecc45cd273b6c92c8.exe
Resource
win10v2004-20220901-en
General
-
Target
ce70228330b3039538e1b47672533444350d9bb31a64766ecc45cd273b6c92c8
-
Size
474KB
-
MD5
544a3f4446212802b8055997fd217d56
-
SHA1
c025e2473df90423451a184626a19c01e9e63021
-
SHA256
ce70228330b3039538e1b47672533444350d9bb31a64766ecc45cd273b6c92c8
-
SHA512
db0c9672ecb78a121c6434709b777f2d8c21380c7355841a4a6a4adccb0ac4eefb488bb77db34c2fff621615d362f53acdbb2d99868d848085b2c7f886df4dbe
-
SSDEEP
12288:00y90vlvCH92NroaRNKJ9ALDvsfogEOYlv6O:00yuBy4RAPUDEfhEOY8
Malware Config
Signatures
Files
-
ce70228330b3039538e1b47672533444350d9bb31a64766ecc45cd273b6c92c8.exe windows x86
fe041ccbcf0af29022c53707c6292b91
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
OpenProcessToken
GetTokenInformation
RegSetValueExA
EqualSid
RegQueryValueExA
LookupPrivilegeValueA
RegCreateKeyExA
RegOpenKeyExA
RegQueryInfoKeyA
RegDeleteValueA
AllocateAndInitializeSid
FreeSid
AdjustTokenPrivileges
RegCloseKey
kernel32
GlobalAlloc
GetPrivateProfileIntA
GetFileAttributesA
IsDBCSLeadByte
GetSystemDirectoryA
GlobalUnlock
GetShortPathNameA
CreateDirectoryA
FindFirstFileA
GetLastError
GetProcAddress
RemoveDirectoryA
SetFileAttributesA
GlobalFree
FindClose
GetPrivateProfileStringA
LoadLibraryA
LocalAlloc
WritePrivateProfileStringA
GetModuleFileNameA
FindNextFileA
CompareStringA
_lopen
CloseHandle
LocalFree
DeleteFileA
ExitProcess
DosDateTimeToFileTime
CreateFileA
FindResourceA
SetFilePointer
FreeResource
LoadResource
WaitForSingleObject
GetWindowsDirectoryA
_lclose
FormatMessageA
SetFileTime
WriteFile
GetDriveTypeA
GetVolumeInformationA
TerminateThread
SizeofResource
CreateEventA
GetExitCodeProcess
CreateProcessA
ReadFile
SetCurrentDirectoryA
GetTempFileNameA
ResetEvent
LockResource
lstrlenA
LoadLibraryExA
CreateMutexA
GetCurrentDirectoryA
GetVersionExA
GetVersion
GetTempPathA
CreateThread
LocalFileTimeToFileTime
SetEvent
ExpandEnvironmentStringsA
lstrcmpA
GlobalLock
GetCurrentProcess
FreeLibrary
GetModuleHandleW
_llseek
Sleep
InterlockedExchange
InterlockedCompareExchange
GetStartupInfoA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
OutputDebugStringA
RtlUnwind
GetModuleHandleA
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
GetTickCount
EnumResourceLanguagesA
MulDiv
GetDiskFreeSpaceA
GetSystemInfo
gdi32
GetDeviceCaps
user32
SetForegroundWindow
MsgWaitForMultipleObjects
SendDlgItemMessageA
GetWindowRect
GetDC
SetWindowLongA
MessageBoxA
GetWindowLongA
PeekMessageA
ReleaseDC
GetDlgItem
SetWindowPos
ShowWindow
DispatchMessageA
SetWindowTextA
EnableWindow
CallWindowProcA
DialogBoxIndirectParamA
GetDlgItemTextA
LoadStringA
MessageBeep
CharUpperA
CharNextA
ExitWindowsEx
CharPrevA
EndDialog
GetDesktopWindow
SetDlgItemTextA
SendMessageA
GetSystemMetrics
msvcrt
__p__fmode
_ismbblead
__setusermatherr
_initterm
_acmdln
memcpy
memset
?terminate@@YAXXZ
_controlfp
_cexit
_amsg_exit
__p__commode
_XcptFilter
_exit
exit
__set_app_type
_errno
_vsnprintf
__getmainargs
comctl32
ord17
cabinet
ord22
ord23
ord21
ord20
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
.text Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 438KB - Virtual size: 440KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ