Static task
static1
Behavioral task
behavioral1
Sample
ceaf686cc95f8ca4d1a4f88c5312746ea59a46fa242580f7bb5a26bb04d5bfd7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ceaf686cc95f8ca4d1a4f88c5312746ea59a46fa242580f7bb5a26bb04d5bfd7.exe
Resource
win10v2004-20221111-en
General
-
Target
ceaf686cc95f8ca4d1a4f88c5312746ea59a46fa242580f7bb5a26bb04d5bfd7
-
Size
281KB
-
MD5
a6816eddf619e8f2e606314fbe05a9ee
-
SHA1
910792880228ef1876d5ea9a64cf69530c13c98f
-
SHA256
ceaf686cc95f8ca4d1a4f88c5312746ea59a46fa242580f7bb5a26bb04d5bfd7
-
SHA512
23e6828b5f07248afd5c7795f274e9d440a7499967fcd0baa8c5313e4c436cadd21880904a129f9581c9fdcab8d51052d68fd0e398c327d30339948e1e75c2ae
-
SSDEEP
6144:flB61Vbx1Boi6/f2JDmbBsuAVA8rPIhG0Kq0MP0rJZS:9BGBw/f2JDPuC7UXKKCZS
Malware Config
Signatures
Files
-
ceaf686cc95f8ca4d1a4f88c5312746ea59a46fa242580f7bb5a26bb04d5bfd7.exe windows x86
5d5bb1abb0cd36333ebc5ef174f49967
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
FlattenPath
GetCharWidth32W
ExtFloodFill
GetKerningPairsW
GetTextExtentExPointW
CreatePalette
wininet
DetectAutoProxyUrl
HttpAddRequestHeadersW
InternetSetCookieW
kernel32
InterlockedIncrement
GetVersion
GetSystemTime
HeapAlloc
MapViewOfFileEx
QueryPerformanceCounter
GetLongPathNameA
PulseEvent
LCMapStringA
CompareStringW
InitializeCriticalSection
GetFileType
CloseHandle
HeapReAlloc
GetOEMCP
TlsSetValue
GetTickCount
DeleteCriticalSection
LoadLibraryA
CreateThread
VirtualProtect
ReadFile
GetLocalTime
GetLastError
GetACP
InterlockedExchange
RtlUnwind
GetStringTypeW
TerminateProcess
HeapFree
TlsAlloc
GetModuleFileNameA
GetTimeZoneInformation
GetStdHandle
OpenMutexA
MultiByteToWideChar
GetStringTypeA
WideCharToMultiByte
GetEnvironmentStringsW
GetCurrentProcessId
CreateWaitableTimerA
GetMailslotInfo
GetCurrentProcess
VirtualFree
GetCommandLineA
FlushFileBuffers
SetConsoleCP
UnhandledExceptionFilter
SetHandleCount
SetLastError
SetFilePointer
GetProcAddress
lstrcmp
IsBadWritePtr
SetEnvironmentVariableA
GetStartupInfoA
LeaveCriticalSection
TlsGetValue
CreateMutexA
GetEnvironmentStrings
GetCurrentThreadId
RtlMoveMemory
LCMapStringW
CompareStringA
TlsFree
FreeEnvironmentStringsA
ExitProcess
GetCPInfo
WriteConsoleInputW
VirtualQuery
HeapDestroy
FileTimeToLocalFileTime
GlobalHandle
EnterCriticalSection
VirtualAlloc
GetModuleHandleA
GetCurrentThread
InterlockedExchangeAdd
WriteFile
SetStdHandle
HeapCreate
FreeEnvironmentStringsW
InterlockedDecrement
GetSystemTimeAsFileTime
comctl32
DrawStatusText
ImageList_SetImageCount
InitCommonControlsEx
ImageList_DragMove
CreateStatusWindow
ImageList_Destroy
ImageList_Add
shell32
DragQueryFileW
SHInvokePrinterCommandW
DuplicateIcon
user32
RegisterClassA
CreateWindowExW
ChangeClipboardChain
LoadMenuIndirectW
SetDebugErrorLevel
ShowWindow
DdeNameService
EnumDesktopsW
MessageBoxA
SetClassLongW
GetMenuStringW
BringWindowToTop
GetDlgCtrlID
IsWindowUnicode
EnumDesktopWindows
ToUnicodeEx
GetUserObjectSecurity
DestroyAcceleratorTable
DefWindowProcW
RegisterClassExA
GetClipboardFormatNameA
GetProcessWindowStation
CharLowerBuffA
DestroyWindow
CreateDialogIndirectParamA
SetWindowRgn
DestroyCursor
Sections
.text Size: 122KB - Virtual size: 122KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 51KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 89KB - Virtual size: 89KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ