Static task
static1
Behavioral task
behavioral1
Sample
ce2aa7253ec42e40bf20cb62a0d1c9bd5fcc5a302069fd90ae4f44d48503b95b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ce2aa7253ec42e40bf20cb62a0d1c9bd5fcc5a302069fd90ae4f44d48503b95b.exe
Resource
win10v2004-20221111-en
General
-
Target
ce2aa7253ec42e40bf20cb62a0d1c9bd5fcc5a302069fd90ae4f44d48503b95b
-
Size
304KB
-
MD5
681204c9c0b31d262f46ad5080fdd5f5
-
SHA1
17d1f015e93c00bf85c17ef3a258ebdc0502b28f
-
SHA256
ce2aa7253ec42e40bf20cb62a0d1c9bd5fcc5a302069fd90ae4f44d48503b95b
-
SHA512
50291b540f75cef9a4fef5e699fe2f111084f96d63a265309f9cb08ee2ab048771e8ec5fb8516c14db9acd680d181e19c215ef884fce55d566c70939f39eed14
-
SSDEEP
6144:K2oiYVGfWJ62thHhRq+XS9AdAlHZLvvZF9lJM+mN9opqU0Dh7FC7hN7GScVn:KyxWJ623hRNC9WANFe+gA6D3avan
Malware Config
Signatures
Files
-
ce2aa7253ec42e40bf20cb62a0d1c9bd5fcc5a302069fd90ae4f44d48503b95b.exe windows x86
a6be5f6815d3e493e5c8f7e01c431066
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineW
ResumeThread
GetTickCount
CreateFileA
GetComputerNameW
GetPrivateProfileIntA
SuspendThread
lstrlenA
GetModuleHandleW
GetFileAttributesA
LocalFree
LoadLibraryA
GetTickCount
CloseHandle
GetSystemTime
ResetEvent
ExitProcess
FindAtomW
GetDiskFreeSpaceW
VirtualAlloc
user32
DestroyCaret
DispatchMessageA
DrawStateA
GetMenu
CreateWindowExA
GetDlgItem
GetCaretPos
FillRect
GetClientRect
CloseWindow
EndDialog
GetClassInfoA
CallWindowProcA
rasapi32
DwCloneEntry
RasDeleteEntryA
RasDialA
DwRasUninitialize
DwEnumEntryDetails
adsnt
DllGetClassObject
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 348KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 294KB - Virtual size: 294KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ