Static task
static1
Behavioral task
behavioral1
Sample
ce6235453a30cddad0b00915279ee96679632196a0188c467c298c8609bfa8bf.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ce6235453a30cddad0b00915279ee96679632196a0188c467c298c8609bfa8bf.dll
Resource
win10v2004-20221111-en
General
-
Target
ce6235453a30cddad0b00915279ee96679632196a0188c467c298c8609bfa8bf
-
Size
11KB
-
MD5
fbe623dbeb98be305d463e05fec31ec1
-
SHA1
dbc5df721988d1d9feace783033a9c57535798ad
-
SHA256
ce6235453a30cddad0b00915279ee96679632196a0188c467c298c8609bfa8bf
-
SHA512
7ec95911790010daee90c5a9e45e44b8809300ce4134ede4e8be3d9d223498a2141b6ac83a4d634e11c79885459746ec3f040e145ad2c38be9db0ee723eb4ba7
-
SSDEEP
96:8uRFZ+2MjdBTmXxUn65R1IBYvS8SwQyscs9+H4sRyCjRo9WYcMbbifziK09vnaXU:5v1MjdBTmXSu6j8SP0DlzlwWYcMbOGAU
Malware Config
Signatures
Files
-
ce6235453a30cddad0b00915279ee96679632196a0188c467c298c8609bfa8bf.dll windows x86
e3c4f75bf19586db16b5aec558f0fd94
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcess
ReadFile
lstrcatA
FindClose
FindFirstFileA
VirtualFreeEx
WaitForSingleObject
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
OpenProcess
GetWindowsDirectoryA
ReleaseMutex
GetLastError
CreateMutexA
FindNextFileA
Sleep
lstrcpyA
GlobalAlloc
CreateThread
GetCurrentProcessId
VirtualAlloc
VirtualFree
CreateToolhelp32Snapshot
Process32First
lstrcmpiA
Process32Next
CreateFileA
GetFileSize
CloseHandle
GetModuleFileNameA
LoadLibraryA
lstrlenA
GetProcAddress
user32
wsprintfA
advapi32
AdjustTokenPrivileges
LookupAccountSidA
GetTokenInformation
OpenProcessToken
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
LookupPrivilegeValueA
msvcrt
sprintf
strcat
_except_handler3
strcpy
strstr
_strlwr
memset
memcpy
Sections
.bss Size: - Virtual size: 580B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ