Static task
static1
Behavioral task
behavioral1
Sample
cadfe2d04eca1413ed970b3dca6ff4d0311e20a8188e12b2f3cf020a56cf3cc4.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
cadfe2d04eca1413ed970b3dca6ff4d0311e20a8188e12b2f3cf020a56cf3cc4.exe
Resource
win10v2004-20220812-en
General
-
Target
cadfe2d04eca1413ed970b3dca6ff4d0311e20a8188e12b2f3cf020a56cf3cc4
-
Size
265KB
-
MD5
64cda632778ad3402deaf4ae0b1cf34e
-
SHA1
fa8d015995b14a98250f653a239f45f560a9552b
-
SHA256
cadfe2d04eca1413ed970b3dca6ff4d0311e20a8188e12b2f3cf020a56cf3cc4
-
SHA512
20a0e739ee99412dc0d56973c08a792600bcce01b5f153daa2efdb11b0100ac8b7ca7cfdcdce33a01c02368a19213e7070b202e2977af4c4c72d08f7711830fa
-
SSDEEP
3072:/EsN2n545dPMed8Sde+Eg5FAg0FuAe+BdFQjMLmYCNgWG511IG2NYXFT1b3YJSWY:/EI2n545dPvw+E+FAOrDzc1WNYXvNd
Malware Config
Signatures
Files
-
cadfe2d04eca1413ed970b3dca6ff4d0311e20a8188e12b2f3cf020a56cf3cc4.exe windows x86
27a8adf00196aa0e9f0a33ea1455b634
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ord17
ImageList_Create
ImageList_Destroy
ImageList_GetImageCount
ImageList_Add
ImageList_ReplaceIcon
ImageList_SetBkColor
ImageList_GetBkColor
ImageList_Draw
ImageList_DrawEx
ImageList_Remove
ImageList_BeginDrag
ImageList_EndDrag
ImageList_DragEnter
ImageList_DragLeave
ImageList_DragMove
ImageList_SetDragCursorImage
ImageList_DragShowNolock
ImageList_GetDragImage
ImageList_Read
ImageList_Write
ImageList_GetIconSize
ImageList_SetIconSize
kernel32
IsValidLanguageGroup
SetComputerNameA
CreateSemaphoreW
QueueUserAPC
CopyFileW
SetConsoleCP
ClearCommError
GetCommMask
CopyFileA
DeleteFileA
FindFirstFileA
FindNextFileA
FindClose
SetFilePointer
MulDiv
ReadFile
WriteFile
GetPrivateProfileStringA
WritePrivateProfileStringA
MultiByteToWideChar
FreeLibrary
GetProcAddress
LoadLibraryA
GetModuleHandleA
SetErrorMode
GetExitCodeProcess
WaitForSingleObject
GlobalAlloc
GlobalFree
ExpandEnvironmentStringsA
GetEnvironmentVariableA
lstrcmpA
GetSystemDirectoryA
lstrcatA
lstrlenA
GetTempFileNameA
CreateFileA
RemoveDirectoryA
CreateProcessA
CreateThread
GlobalLock
GlobalUnlock
GetDiskFreeSpaceA
lstrcpynA
GetTempPathA
GetWindowsDirectoryA
GetCommandLineA
ExitProcess
lstrcmpiA
GetCurrentProcess
GetTickCount
GetModuleFileNameA
GetFileSize
Sleep
SetFileAttributesA
CreateDirectoryA
GetLastError
GetFileAttributesA
SetCurrentDirectoryA
MoveFileA
GetFullPathNameA
GetShortPathNameA
SearchPathA
CompareFileTime
SetFileTime
CloseHandle
VirtualAlloc
InterlockedIncrement
InterlockedDecrement
GetSystemTimeAsFileTime
GetStartupInfoA
GetCPInfo
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
GetStringTypeW
HeapAlloc
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCurrentProcessId
LCMapStringA
LCMapStringW
HeapReAlloc
InitializeCriticalSectionAndSpinCount
RtlUnwind
GetLocaleInfoW
HeapSize
GetConsoleCP
GetConsoleMode
FlushFileBuffers
RaiseException
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
Sections
.text Size: 121KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 118KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 104KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ