Static task
static1
Behavioral task
behavioral1
Sample
ce108e27dad1c6e92ef713bb107817e73ca61023f49116efd82c44e80b22152c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ce108e27dad1c6e92ef713bb107817e73ca61023f49116efd82c44e80b22152c.exe
Resource
win10v2004-20220812-en
General
-
Target
ce108e27dad1c6e92ef713bb107817e73ca61023f49116efd82c44e80b22152c
-
Size
1.1MB
-
MD5
20631ceb5bce440d4ca21e48cccf9730
-
SHA1
f14a49bba5638a9636d7997c3cc36e228c21ec79
-
SHA256
ce108e27dad1c6e92ef713bb107817e73ca61023f49116efd82c44e80b22152c
-
SHA512
f9a712f23deed0d3700d354b186af3faebe5605b8c61a337f287e768cf8d964b929d832c5b53f76104e28045cc457f6d1f7dbb1985947d716da5ce9ce4bbff5b
-
SSDEEP
24576:tpE99b5lWk1/JUVbsAwDBpGgePQl9ap8lJfnvdTS8saq:tpa9VEk1/QbsbBWa9zl1nv5cl
Malware Config
Signatures
Files
-
ce108e27dad1c6e92ef713bb107817e73ca61023f49116efd82c44e80b22152c.exe windows x86
da86b3562ddaded41c2d2155138be06a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WritePrivateProfileStringA
GlobalFlags
ReadFile
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
DuplicateHandle
GetVolumeInformationA
GetFullPathNameA
FileTimeToSystemTime
GetCPInfo
GetOEMCP
FileTimeToLocalFileTime
GetFileSizeEx
GetFileTime
SetErrorMode
UnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
VirtualAlloc
GetSystemInfo
VirtualQuery
ExitProcess
GetSystemTimeAsFileTime
GetCommandLineA
GetStartupInfoA
HeapReAlloc
DeleteCriticalSection
VirtualFree
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetTimeZoneInformation
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
SetHandleCount
GetFileType
GetConsoleCP
GetConsoleMode
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetStringTypeA
GetStringTypeW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
LocalReAlloc
TlsSetValue
GetThreadContext
SetThreadContext
FlushInstructionCache
InterlockedCompareExchange
HeapCreate
TlsFree
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GetModuleHandleW
RaiseException
GetThreadLocale
GetModuleFileNameW
FreeResource
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
GetVersionExA
GetCurrentProcessId
GlobalAddAtomA
SuspendThread
ResumeThread
GlobalDeleteAtom
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
CompareStringA
InterlockedExchange
lstrcmpA
SetLastError
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
MulDiv
GetLocalTime
OutputDebugStringW
CreateFileA
GetFileSize
SetFilePointer
FindFirstFileA
FindClose
CreateToolhelp32Snapshot
Process32First
Process32Next
lstrlenW
TerminateThread
CreateThread
CreateProcessW
CreateProcessA
WideCharToMultiByte
FindResourceA
GetTempPathW
GetTempFileNameW
GetPrivateProfileStringW
WriteProfileSectionA
CreateMutexA
GetCommandLineW
GetPrivateProfileIntW
OutputDebugStringA
GetCurrentDirectoryA
SetFileAttributesA
SetUnhandledExceptionFilter
GetCurrentThread
FindResourceW
GetLastError
SizeofResource
LoadResource
LockResource
GetCurrentDirectoryW
CreateFileW
WriteFile
CloseHandle
SetPriorityClass
LoadLibraryExA
FreeLibrary
GetFileAttributesA
DeleteFileA
WriteProcessMemory
VirtualProtect
GetModuleHandleA
GetModuleFileNameA
GetTempPathA
CopyFileA
GetTickCount
GetProcessHeap
HeapAlloc
HeapFree
LoadLibraryA
GetProcAddress
Sleep
GetCurrentProcess
TerminateProcess
lstrlenA
MultiByteToWideChar
InterlockedDecrement
HeapSize
InterlockedIncrement
user32
PostThreadMessageA
UnregisterClassA
MessageBeep
GetNextDlgGroupItem
InvalidateRgn
InvalidateRect
SetRect
IsRectEmpty
CopyAcceleratorTableA
CharUpperA
ReleaseCapture
SetCapture
LoadCursorA
GetSysColorBrush
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
DestroyMenu
CharNextA
GetDesktopWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
SetWindowContextHelpId
MapDialogRect
MoveWindow
SetWindowTextA
IsDialogMessageA
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
SetFocus
GetForegroundWindow
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
SetForegroundWindow
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
EqualRect
CopyRect
PostMessageW
GetWindowTextA
wsprintfW
SetActiveWindow
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
PtInRect
GetMenu
SetWindowPos
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetWindow
GetWindowThreadProcessId
GetLastActivePopup
IsWindowEnabled
RegisterClipboardFormatA
GetClassNameA
GetActiveWindow
ShowWindow
MessageBoxW
MessageBoxA
LoadIconA
SetTimer
KillTimer
SetWindowLongA
GetWindowLongA
SendMessageA
AppendMenuA
GetSystemMenu
DrawIcon
GetClientRect
GetSystemMetrics
IsIconic
UpdateWindow
EnableWindow
GetParent
IsWindow
PostMessageA
FindWindowExA
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
PostQuitMessage
CheckMenuItem
EnableMenuItem
ModifyMenuA
GetFocus
LoadBitmapA
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
ValidateRect
SetCursor
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
gdi32
DeleteDC
ExtSelectClipRgn
GetRgnBox
GetMapMode
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
TextOutA
CreateRectRgnIndirect
GetDeviceCaps
PtVisible
GetWindowExtEx
GetViewportExtEx
DeleteObject
SetMapMode
RestoreDC
SaveDC
ExtTextOutA
GetTextColor
GetBkColor
GetStockObject
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
RectVisible
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shlwapi
PathFindFileNameA
StrStrIW
PathStripToRootA
PathIsUNCA
StrStrIA
PathFindExtensionA
oledlg
ord8
ole32
CoCreateInstance
CoInitializeEx
CoTaskMemFree
CoTaskMemAlloc
CLSIDFromProgID
CLSIDFromString
CoGetClassObject
CoUninitialize
PropVariantClear
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
CoRegisterMessageFilter
OleIsCurrentClipboard
OleFlushClipboard
oleaut32
SysFreeString
SysAllocString
SysAllocStringByteLen
SysStringByteLen
SysAllocStringLen
VariantChangeType
VariantCopy
VariantInit
SysStringLen
OleCreateFontIndirect
DispCallFunc
LoadRegTypeLi
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayGetElemsize
SafeArrayCreate
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
VariantClear
ws2_32
WSASetLastError
inet_addr
WSAStartup
WSACleanup
iphlpapi
GetAdaptersInfo
winmm
waveOutWrite
midiStreamOut
waveOutSetVolume
wininet
FindCloseUrlCache
DeleteUrlCacheEntry
FindNextUrlCacheEntryA
FindFirstUrlCacheEntryA
DeleteUrlCacheEntryA
Sections
.text Size: 375KB - Virtual size: 375KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 71KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 715KB - Virtual size: 715KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ