Static task
static1
Behavioral task
behavioral1
Sample
1ce8f73856ecabb036f118661016953fc935d098c544e19b22bbc46fb9758eca.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1ce8f73856ecabb036f118661016953fc935d098c544e19b22bbc46fb9758eca.exe
Resource
win10v2004-20220901-en
General
-
Target
1ce8f73856ecabb036f118661016953fc935d098c544e19b22bbc46fb9758eca
-
Size
190KB
-
MD5
00f4b16f94ccbb4ca4363bde38b803db
-
SHA1
22c8dd7a621b6fb3985296f8389dc0bc4646859d
-
SHA256
1ce8f73856ecabb036f118661016953fc935d098c544e19b22bbc46fb9758eca
-
SHA512
688fb2a5844a3db2b9a5eae84e4622fe7f170104eb71b5d6845c24940a5508004120362d13d3c46ca7d127bc662cc34f50a828188a5e12a3ef1fd5c43c205702
-
SSDEEP
3072:8ZI6wXX9+/BZAtMG+oh2GSIG5ikwzodiURILs3CiIZhH8qVz:5T+/BczqGNG5TwFURILsy7tVz
Malware Config
Signatures
Files
-
1ce8f73856ecabb036f118661016953fc935d098c544e19b22bbc46fb9758eca.exe windows x86
f477cc8ebe4f1a8f64385ed6f58daf06
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcessHeap
GetSystemDefaultUILanguage
UnmapViewOfFile
CreateFileW
lstrlenA
CreateFileMappingW
MapViewOfFile
SearchPathW
CreateActCtxW
ReleaseActCtx
ActivateActCtx
DeactivateActCtx
InterlockedCompareExchange
lstrcmpW
GlobalAlloc
GlobalLock
EnumUILanguagesW
GlobalFree
GlobalUnlock
LocalFree
FormatMessageW
WideCharToMultiByte
InitializeCriticalSectionAndSpinCount
MulDiv
FindResourceExW
LockResource
SetLastError
GetCurrentThreadId
GetCurrentProcess
FlushInstructionCache
LoadLibraryExW
FindResourceW
LoadResource
SizeofResource
MultiByteToWideChar
FreeLibrary
lstrcmpiW
GetModuleHandleW
GetProcAddress
LoadLibraryW
InterlockedDecrement
InterlockedIncrement
oleaut32
DispInvoke
GetActiveObject
OleLoadPicturePath
VariantInit
SysFreeString
Sections
.text Size: 92KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 96KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ