Static task
static1
Behavioral task
behavioral1
Sample
ce92d42aff69e62c6464d83e45311647d7ca9801f37b9f12c7366d524fa7d3b1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ce92d42aff69e62c6464d83e45311647d7ca9801f37b9f12c7366d524fa7d3b1.exe
Resource
win10v2004-20221111-en
General
-
Target
ce92d42aff69e62c6464d83e45311647d7ca9801f37b9f12c7366d524fa7d3b1
-
Size
470KB
-
MD5
a6859035ef9baff8f94d90d363f7c269
-
SHA1
73ab4bccee11f6393e342f643b603c9b74d6f905
-
SHA256
ce92d42aff69e62c6464d83e45311647d7ca9801f37b9f12c7366d524fa7d3b1
-
SHA512
fefcc02441c0956d40af3d7d85ed8a42afa6e75946962dd6f024498bd74dd1f1ae5d5d2682e13b24b5880265f7515dcc00966d816fdce75d6b6ca4ac44705f4f
-
SSDEEP
12288:57Lg6S2oYkyC5lmlHaFY8J9aPoOXpkJIw5hxNW4EWNh:ZktX4lLoDJDvlNh
Malware Config
Signatures
Files
-
ce92d42aff69e62c6464d83e45311647d7ca9801f37b9f12c7366d524fa7d3b1.exe windows x86
0c888e133105308885f3999fbfc70287
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
wsock32
__WSAFDIsSet
version
VerQueryValueW
winmm
timeGetTime
comctl32
ImageList_Remove
mpr
WNetCancelConnection2W
wininet
InternetReadFile
psapi
EnumProcesses
userenv
CreateEnvironmentBlock
user32
SetWindowPos
gdi32
DeleteObject
comdlg32
GetSaveFileNameW
advapi32
RegEnumValueW
shell32
DragQueryPoint
ole32
OleSetMenuDescriptor
oleaut32
SafeArrayAllocData
Sections
.text Size: 243KB - Virtual size: 700KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 15KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE