Static task
static1
Behavioral task
behavioral1
Sample
cecd30ffed044a2f1446a5a4f11bd867c2a530735b0453e02a6e57b7d9a133c7.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
cecd30ffed044a2f1446a5a4f11bd867c2a530735b0453e02a6e57b7d9a133c7.exe
Resource
win10v2004-20221111-en
General
-
Target
cecd30ffed044a2f1446a5a4f11bd867c2a530735b0453e02a6e57b7d9a133c7
-
Size
9KB
-
MD5
4ab06f0cb045c1641282b61ed57aa68b
-
SHA1
bc26918cf4b5899b8db73c7d73853c81255ae4d7
-
SHA256
cecd30ffed044a2f1446a5a4f11bd867c2a530735b0453e02a6e57b7d9a133c7
-
SHA512
82c3bfc5dcf9f688ba316f2cedc39806a0036d8b85c7996c7ae85dc19dc73bb5e30b5196684a58c0c1536c30c3b3319173b2ae46080b1a36888553058b06c9af
-
SSDEEP
96:sFTaic14C5sp3jTAPBK0d/UMDIq4q8gtaieU/JaZibGCzruVAd6qivCtlbB:+aiEl5sp3jcPD4q8gTuizzruVW6qi+
Malware Config
Signatures
Files
-
cecd30ffed044a2f1446a5a4f11bd867c2a530735b0453e02a6e57b7d9a133c7.exe windows x86
ee7244c4066cc2b0ea96d8adc01bb7c8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateProcessW
CloseHandle
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
DecodePointer
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
EncodePointer
GetStartupInfoW
HeapSetInformation
InterlockedCompareExchange
Sleep
InterlockedExchange
GetSystemTimeAsFileTime
user32
LoadAcceleratorsW
LoadStringW
EndDialog
PostQuitMessage
EndPaint
BeginPaint
DefWindowProcW
DestroyWindow
DialogBoxParamW
RegisterClassExW
LoadIconW
LoadCursorW
DispatchMessageW
TranslateMessage
TranslateAcceleratorW
GetMessageW
shell32
SHGetFolderPathW
urlmon
URLDownloadToFileW
msvcr100
_unlock
_controlfp_s
_invoke_watson
_except_handler4_common
wcscat_s
strcpy_s
_amsg_exit
__wgetmainargs
_cexit
_exit
_XcptFilter
exit
_wcmdln
_onexit
_initterm_e
_configthreadlocale
__setusermatherr
_commode
_fmode
__set_app_type
_crt_debugger_hook
?terminate@@YAXXZ
_initterm
__dllonexit
_lock
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 668B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 550B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ