Static task
static1
Behavioral task
behavioral1
Sample
0ce3174679425f8968ab47366fc2c5dd25c26aeb548de8514144c0315b9093c1.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
0ce3174679425f8968ab47366fc2c5dd25c26aeb548de8514144c0315b9093c1.exe
Resource
win10v2004-20221111-en
General
-
Target
0ce3174679425f8968ab47366fc2c5dd25c26aeb548de8514144c0315b9093c1
-
Size
327KB
-
MD5
2ecc6831336a4b50ffca725c1228179d
-
SHA1
60f3906a2b682b3d6fddbc6b82c6192f62514223
-
SHA256
0ce3174679425f8968ab47366fc2c5dd25c26aeb548de8514144c0315b9093c1
-
SHA512
0e0a322145d0c0d45baf973a3cc8196fdb1242b61307948cf69e1926804670566c4506dd7cd3d8310c6554b193162c94e66a76dc3fb0376475c95f310def8f8a
-
SSDEEP
6144:Tvl7Mt0ggNGUWX37IxM3qmPXzEnDpcYAKl4ha5GQ:TNIdga8xM6mPylD5GQ
Malware Config
Signatures
Files
-
0ce3174679425f8968ab47366fc2c5dd25c26aeb548de8514144c0315b9093c1.exe windows x86
82ec38daa57f447e62febab5b62188c0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetKerningPairs
CreateHatchBrush
SetBkColor
PlayMetaFileRecord
SetWindowExtEx
GetGlyphOutlineA
CloseFigure
GetTextFaceW
CreateRectRgn
user32
GetMenuState
MessageBoxW
CreateWindowExW
CharUpperA
RegisterClassExA
ShowWindow
RegisterClassA
MapWindowPoints
SetProcessDefaultLayout
DdeCmpStringHandles
GetWindowLongW
comctl32
InitCommonControlsEx
kernel32
GetOEMCP
WriteFile
HeapValidate
DebugBreak
WaitForMultipleObjects
LCMapStringA
HeapReAlloc
VirtualFree
InterlockedExchange
LoadLibraryA
GetProcAddress
GetStdHandle
SetThreadAffinityMask
GlobalAddAtomW
RemoveDirectoryW
LCMapStringW
TlsFree
OpenMutexA
GetEnvironmentStringsW
TlsGetValue
CommConfigDialogW
WideCharToMultiByte
MultiByteToWideChar
LeaveCriticalSection
GetCurrentProcess
SetHandleCount
SetFilePointer
GetCPInfo
TlsSetValue
ReadFile
TlsAlloc
IsBadWritePtr
GetTickCount
VirtualQuery
GetEnvironmentStrings
GetFileType
FlushFileBuffers
QueryPerformanceCounter
CompareStringA
GetCurrentThread
GetStringTypeA
HeapAlloc
EnterCriticalSection
WaitNamedPipeA
GetModuleFileNameA
CreateMutexA
GetLastError
RtlUnwind
IsBadReadPtr
GetCurrentThreadId
InterlockedDecrement
OutputDebugStringA
FreeEnvironmentStringsA
DeleteCriticalSection
CompareStringW
HeapFree
SetConsoleCtrlHandler
GetSystemDefaultLangID
GetCurrentProcessId
VirtualAllocEx
SetLastError
GetSystemTime
GetTimeZoneInformation
TerminateProcess
GetStringTypeW
InterlockedIncrement
FillConsoleOutputAttribute
InitializeCriticalSection
VirtualAlloc
CloseHandle
WaitNamedPipeW
SetStdHandle
GetACP
CreateNamedPipeW
GetVersion
ExitProcess
HeapCreate
CreateThread
SetEnvironmentVariableA
GetLocalTime
HeapDestroy
UnhandledExceptionFilter
FreeEnvironmentStringsW
GetCommandLineA
GetSystemTimeAsFileTime
SetConsoleActiveScreenBuffer
GetModuleHandleA
GetStartupInfoA
advapi32
RegQueryValueA
CryptGetProvParam
CryptEncrypt
CryptEnumProviderTypesA
comdlg32
LoadAlterBitmap
PageSetupDlgW
wininet
InternetErrorDlg
SetUrlCacheEntryGroupA
InternetQueryOptionW
Sections
.text Size: 209KB - Virtual size: 209KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 17KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 90KB - Virtual size: 89KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ