Static task
static1
Behavioral task
behavioral1
Sample
cedb2cfee4c74644de30f6645f77aa9babe71244197b6a28d64a14396fc48de0.exe
Resource
win7-20220812-en
General
-
Target
cedb2cfee4c74644de30f6645f77aa9babe71244197b6a28d64a14396fc48de0
-
Size
5.9MB
-
MD5
bca5385d91aca27277ffd1ffd4db726a
-
SHA1
2ffb17253c52ac0208124f6d31fb661f7ad7e098
-
SHA256
cedb2cfee4c74644de30f6645f77aa9babe71244197b6a28d64a14396fc48de0
-
SHA512
9d73e4352a4365615a5040a6cbb085328709daa4d69b4b7c94aede625d616161889c9ce40a9899c3873d8fa09fc0af2d80f4c29f5244dc87dcbcd3a01db7e2cd
-
SSDEEP
98304:/vo65clRIbZExIr12YpWRZGjVkWHBWt3OVMskp3ZAvMcYiXUqutf9xpiAujHOiwT:nV0gV2RsV83MjkRuvMcYiXlQf9xpiFz4
Malware Config
Signatures
Files
-
cedb2cfee4c74644de30f6645f77aa9babe71244197b6a28d64a14396fc48de0.exe windows x86
038679f64f253c67e4215cb89398d68c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ord17
kernel32
DeleteCriticalSection
InitializeCriticalSection
CloseHandle
WaitForMultipleObjects
SetEvent
CreateThread
WaitForSingleObject
ResetEvent
VirtualAlloc
VirtualFree
GetModuleHandleA
MultiByteToWideChar
WideCharToMultiByte
GetLastError
AreFileApisANSI
GetModuleFileNameA
GetModuleFileNameW
LocalFree
FormatMessageA
FormatMessageW
GetWindowsDirectoryA
SetFileAttributesA
SetFileAttributesW
RemoveDirectoryA
RemoveDirectoryW
CreateDirectoryA
CreateDirectoryW
DeleteFileA
DeleteFileW
lstrlenA
GetFullPathNameA
GetFullPathNameW
GetCurrentDirectoryA
SetCurrentDirectoryA
GetTempPathA
GetTempFileNameA
FindClose
FindFirstFileA
FindFirstFileW
FindNextFileA
CreateFileA
CreateFileW
GetFileSize
SetFilePointer
ReadFile
SetFileTime
WriteFile
SetEndOfFile
CreateEventA
LeaveCriticalSection
EnterCriticalSection
Sleep
CreateProcessA
GetCommandLineW
GetVersionExA
GetStartupInfoA
user32
EndDialog
KillTimer
PostMessageA
ShowWindow
SendMessageA
GetDlgItem
MessageBoxW
SetTimer
SetWindowTextW
SetWindowTextA
LoadStringW
LoadStringA
DialogBoxParamW
DialogBoxParamA
SetWindowLongA
GetWindowLongA
CharUpperW
CharUpperA
DestroyWindow
shell32
ShellExecuteExA
oleaut32
VariantClear
SysAllocString
msvcrt
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_onexit
__dllonexit
_except_handler3
??1type_info@@UAE@XZ
memcpy
free
malloc
memmove
memcmp
_purecall
_CxxThrowException
__CxxFrameHandler
_controlfp
Sections
.text Size: 74KB - Virtual size: 74KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.0rdata Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE