Static task
static1
Behavioral task
behavioral1
Sample
ce901894a0eacf01a2e39ec45d603349d6b18d79c44d94a082513d0bfadf224b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ce901894a0eacf01a2e39ec45d603349d6b18d79c44d94a082513d0bfadf224b.exe
Resource
win10v2004-20220901-en
General
-
Target
ce901894a0eacf01a2e39ec45d603349d6b18d79c44d94a082513d0bfadf224b
-
Size
715KB
-
MD5
0e513783baf83d07cc31771ccad464d0
-
SHA1
92d3e235e2473fc276ad0bb35cd406aaab038c5f
-
SHA256
ce901894a0eacf01a2e39ec45d603349d6b18d79c44d94a082513d0bfadf224b
-
SHA512
30f533d971a034fb5632db948cf081cf5c9aba426e4c27c7dd84a50884539815b349bef77d2825c22d68e7c980f3e48635b4301cfc5714ac16f4d00f43127a79
-
SSDEEP
12288:lDbwow3SEY4aKhWynv28q+oEpXM84qs05e1rcOzmtOojNEYX9:xwowpY4nhW828+ezy6eBcOzmtdjNEYX
Malware Config
Signatures
Files
-
ce901894a0eacf01a2e39ec45d603349d6b18d79c44d94a082513d0bfadf224b.exe windows x86
8173b178508983b75436b254758fb996
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCreateKeyExA
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
CloseServiceHandle
OpenThreadToken
InitializeAcl
FreeSid
RegCloseKey
InitializeSecurityDescriptor
wsock32
WSACleanup
version
GetFileVersionInfoSizeA
VerQueryValueA
comctl32
ImageList_GetImageInfo
ord17
InitCommonControlsEx
PropertySheetA
ImageList_GetIconSize
ImageList_GetImageCount
ImageList_GetIcon
ImageList_AddMasked
ImageList_Create
ImageList_ReplaceIcon
ImageList_Destroy
_TrackMouseEvent
ImageList_Draw
comdlg32
GetSaveFileNameA
GetFileTitleA
oleaut32
LoadTypeLi
gdi32
CreatePolygonRgn
SetAbortProc
GetBoundsRect
MaskBlt
IntersectClipRect
PolyBezierTo
CreateDIBSection
CreateHatchBrush
StretchBlt
GetOutlineTextMetricsA
CreateRectRgnIndirect
Polygon
BeginPath
GetObjectA
Ellipse
ResetDCA
DeleteObject
CreateSolidBrush
SetPixelV
GetWindowOrgEx
StartDocA
TextOutA
OffsetViewportOrgEx
GetFontData
CombineRgn
SetStretchBltMode
CreateCompatibleBitmap
CreateRectRgn
ScaleViewportExtEx
CreatePalette
GetGlyphOutlineA
CreateRoundRectRgn
Polyline
SelectObject
ExtSelectClipRgn
GetCharABCWidthsA
GetStretchBltMode
GetPolyFillMode
EndPath
OffsetWindowOrgEx
ExcludeClipRect
PtInRegion
CloseEnhMetaFile
GetViewportOrgEx
CreateDCA
CreateEnhMetaFileA
SetTextColor
RoundRect
PatBlt
ScaleWindowExtEx
CreateCompatibleDC
CreateDIBitmap
DeleteDC
SetBkMode
Rectangle
Escape
CreateBitmapIndirect
GetDeviceCaps
LPtoDP
SetROP2
user32
FillRect
UnregisterClassA
GetLastActivePopup
GetKeyboardLayout
SetWindowsHookExA
GetIconInfo
UpdateWindow
ToAsciiEx
GetForegroundWindow
GetSysColorBrush
ShowOwnedPopups
ReleaseCapture
OffsetRect
GetWindowLongA
BringWindowToTop
SetWindowLongA
DrawMenuBar
GetClientRect
SetClipboardData
GetFocus
SetWindowTextA
GetMessageTime
DefWindowProcA
SetMenu
GetDlgItem
GetSystemMetrics
GetMenuState
SendDlgItemMessageA
RegisterClassA
LoadMenuA
GetSysColor
PostThreadMessageA
EqualRect
GetMenuItemCount
CheckMenuItem
GetParent
SetRect
GetSystemMenu
CreateWindowExA
GetWindowTextA
SendMessageA
DrawFocusRect
GetActiveWindow
LoadImageA
CharUpperBuffA
ShowWindow
DrawTextExA
EndDialog
TranslateAcceleratorA
SetRectEmpty
InflateRect
RegisterClassExA
IsWindowVisible
RemovePropA
GetWindowPlacement
PostQuitMessage
GetDesktopWindow
CreateDialogIndirectParamA
PostMessageA
AppendMenuA
ScrollWindow
CloseClipboard
kernel32
GetUserDefaultLCID
LeaveCriticalSection
GetACP
UnhandledExceptionFilter
GetSystemTimeAsFileTime
LCMapStringA
DeleteCriticalSection
IsBadReadPtr
FreeEnvironmentStringsA
VirtualQuery
GetDateFormatA
SetStdHandle
GetVersionExA
ExitProcess
SetConsoleCtrlHandler
SetFilePointer
RaiseException
IsBadCodePtr
TlsSetValue
QueryPerformanceCounter
TlsGetValue
HeapCreate
GetLocaleInfoW
CloseHandle
VirtualProtect
GetOEMCP
TlsFree
GetCurrentProcess
LCMapStringW
GetStringTypeA
GetStringTypeW
CreateMutexA
EnterCriticalSection
HeapDestroy
FatalAppExitA
SetUnhandledExceptionFilter
GetTickCount
CompareStringW
GetStdHandle
HeapSize
InterlockedExchange
LoadLibraryA
EnumSystemLocalesA
HeapFree
FreeEnvironmentStringsW
VirtualAlloc
GetCurrentProcessId
HeapAlloc
MultiByteToWideChar
WriteFile
GetLocaleInfoA
GetModuleHandleA
IsBadWritePtr
GetEnvironmentStringsW
GetCPInfo
SetHandleCount
IsValidCodePage
ReadFile
InitializeCriticalSection
FlushFileBuffers
GetTimeFormatA
HeapReAlloc
GetProcAddress
IsValidLocale
GetCurrentThread
GetCurrentThreadId
SetEnvironmentVariableA
CompareStringA
WideCharToMultiByte
SetLastError
RtlUnwind
VirtualFree
GetModuleFileNameA
GetStartupInfoA
GetSystemInfo
GetTimeZoneInformation
GetLastError
TlsAlloc
GetEnvironmentStrings
TerminateProcess
GetCommandLineA
GetFileType
Sections
.text Size: 90KB - Virtual size: 89KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 455KB - Virtual size: 455KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 93KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 75KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ