Static task
static1
Behavioral task
behavioral1
Sample
0cee1241beabd7eb836df6fcf4ac648d6329397f99ee450360b23df1eaf462b1.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
0cee1241beabd7eb836df6fcf4ac648d6329397f99ee450360b23df1eaf462b1.exe
Resource
win10v2004-20221111-en
General
-
Target
0cee1241beabd7eb836df6fcf4ac648d6329397f99ee450360b23df1eaf462b1
-
Size
94KB
-
MD5
b36855d3fff48c87841f295e7fa1d4dd
-
SHA1
0f000e910e472c66f6e8d7ef2df8a04943e6ef12
-
SHA256
0cee1241beabd7eb836df6fcf4ac648d6329397f99ee450360b23df1eaf462b1
-
SHA512
9cc5d33f721a3fa4ef476e9f7079bbe5eee25beb18a13de42da97e1b4bd9420c3b53734a97aa670f386202e261dfbc7a3158d45bbd04b57b5958fb7bbaf950f9
-
SSDEEP
1536:vKS4KW5O9o8wjhS5UESsqmjFj/1JgiRr/UzGhrRyQQw421zrn18gPhmPptoW:vKf89lwjrsdjFhJg0dhrdQw42BnSg8PL
Malware Config
Signatures
Files
-
0cee1241beabd7eb836df6fcf4ac648d6329397f99ee450360b23df1eaf462b1.exe windows x86
671e8c12286ec0666c2b4283a861daeb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetWindowLongA
DrawEdge
EnumWindows
GetMessagePos
SystemParametersInfoA
BeginDeferWindowPos
IsWindowVisible
CharLowerA
DispatchMessageW
IsChild
GetClipboardData
GetCursor
GetDesktopWindow
EnableScrollBar
ClientToScreen
FindWindowA
GetCursorPos
CreatePopupMenu
IsWindowEnabled
CallWindowProcA
EqualRect
IsDialogMessageA
GetMenuItemInfoA
GetDlgItem
EndPaint
GetKeyState
MessageBoxA
shell32
Shell_NotifyIconA
SHGetFolderPathA
SHGetFileInfoA
DragQueryFileA
SHGetDesktopFolder
kernel32
CreateThread
GetUserDefaultLCID
VirtualAlloc
GetCurrentProcessId
VirtualAllocEx
ExitThread
SetEndOfFile
lstrcpyA
GetVersionExA
HeapAlloc
FindResourceA
GetFileSize
SetErrorMode
CreateFileA
WideCharToMultiByte
VirtualQuery
ExitProcess
SetThreadLocale
LoadLibraryA
GetModuleHandleA
GetCurrentProcess
GetFileAttributesA
oleaut32
SafeArrayCreate
OleLoadPicture
SafeArrayPtrOfIndex
SysReAllocStringLen
VariantChangeType
RegisterTypeLib
SafeArrayUnaccessData
SysStringLen
SafeArrayGetElement
SafeArrayGetUBound
ole32
CoGetObjectContext
CoCreateInstanceEx
CoGetMalloc
comdlg32
FindTextA
GetFileTitleA
GetSaveFileNameA
gdi32
CreateFontIndirectA
GetObjectA
GetPixel
GetRgnBox
CopyEnhMetaFileA
CreatePalette
BitBlt
SetBkMode
msvcrt
malloc
swprintf
wcschr
sqrt
rand
memcpy
log10
wcsncmp
log
memset
exp
sprintf
strlen
srand
memcmp
wcstol
Sections
CODE Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: 1024B - Virtual size: 661B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ