Static task
static1
Behavioral task
behavioral1
Sample
cde57f7c8525fc901f2f596ba7558fd069b45d904bb53bfe845f342cf313a5ee.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
cde57f7c8525fc901f2f596ba7558fd069b45d904bb53bfe845f342cf313a5ee.exe
Resource
win10v2004-20221111-en
General
-
Target
cde57f7c8525fc901f2f596ba7558fd069b45d904bb53bfe845f342cf313a5ee
-
Size
656KB
-
MD5
ce59e9e978d2bbc8443cc5f47361b033
-
SHA1
327076a06ed2a2582acdd09a65461485f0db84d0
-
SHA256
cde57f7c8525fc901f2f596ba7558fd069b45d904bb53bfe845f342cf313a5ee
-
SHA512
b4f1124f1fb9fdbd78e889826b1a5e11d0c9b231274b5671928a952bcec2aba1b656dbd262b63993fbb5eb29aac64544d048c0d213cd4d5634f3719355f0921b
-
SSDEEP
12288:o+Ewho6KDI/Qb83oXX1vbbqusJQ4TjUi942mZ4jl/IZaeio288:oUho7b8W1vCuOxvU0BmZWlQYc0
Malware Config
Signatures
Files
-
cde57f7c8525fc901f2f596ba7558fd069b45d904bb53bfe845f342cf313a5ee.exe windows x86
484fa34a4ad9472d1657b73801bbe540
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHGetSpecialFolderLocation
ShellExecuteA
Shell_NotifyIconA
ord155
comctl32
ImageList_AddMasked
ImageList_DragEnter
_TrackMouseEvent
ImageList_ReplaceIcon
ord17
ImageList_LoadImageA
ImageList_GetImageCount
ImageList_GetIconSize
ImageList_DragMove
ImageList_DragShowNolock
InitCommonControlsEx
ImageList_GetIcon
ImageList_EndDrag
ImageList_DragLeave
ImageList_Destroy
ImageList_DrawEx
DestroyPropertySheetPage
ImageList_Draw
oleaut32
LoadTypeLi
user32
SendMessageW
WindowFromPoint
IsWindowVisible
LoadStringW
RegisterClassW
SetMenu
GetFocus
SetRectEmpty
SetWindowPlacement
GetScrollPos
GetScrollInfo
EnumChildWindows
SystemParametersInfoA
GetSysColorBrush
SetTimer
TranslateMDISysAccel
CheckDlgButton
RegisterClassExW
SetWindowTextA
SetRect
MoveWindow
ReleaseCapture
UnionRect
RegisterClipboardFormatW
ClientToScreen
OpenClipboard
EndDeferWindowPos
ShowWindow
GetForegroundWindow
SetActiveWindow
SetForegroundWindow
GetWindowRect
GetWindowPlacement
GetDlgItem
EnumWindows
CopyRect
LoadImageW
GetMessageW
RegisterWindowMessageW
BeginDeferWindowPos
GetMenu
RedrawWindow
GetSystemMetrics
DestroyCursor
GetClipboardData
SetWindowLongA
kernel32
LCMapStringA
GetCurrentProcess
GetStartupInfoA
EnterCriticalSection
GetStringTypeW
HeapReAlloc
InterlockedExchange
GetModuleFileNameW
TlsAlloc
GetLocaleInfoW
VirtualFree
HeapCreate
GetCommandLineW
GetFileType
SetStdHandle
HeapSize
GetVersionExA
GetEnvironmentStrings
DeleteCriticalSection
VirtualProtect
IsValidCodePage
WriteFile
LoadLibraryA
QueryPerformanceCounter
LCMapStringW
IsValidLocale
WideCharToMultiByte
GetStdHandle
GetOEMCP
VirtualAlloc
GetProcAddress
TlsGetValue
GetACP
GetCommandLineA
GetLocaleInfoA
GetStartupInfoW
FlushFileBuffers
GetLastError
ExitProcess
GetCurrentProcessId
FatalAppExitA
GetModuleFileNameA
CreateMutexW
GetDateFormatA
GetTickCount
ReadFile
SetFilePointer
GetCurrentThreadId
GetUserDefaultLCID
HeapDestroy
InitializeCriticalSection
GetStringTypeA
RtlUnwind
CompareStringA
FreeEnvironmentStringsA
GetSystemTimeAsFileTime
CloseHandle
GetSystemInfo
GetCurrentThread
SetLastError
CompareStringW
LeaveCriticalSection
VirtualQuery
UnhandledExceptionFilter
GetTimeFormatA
GetCPInfo
MultiByteToWideChar
FreeEnvironmentStringsW
GetModuleHandleA
GetEnvironmentStringsW
TerminateProcess
TlsSetValue
IsBadWritePtr
HeapFree
GetModuleHandleW
GetTimeZoneInformation
HeapAlloc
SetHandleCount
SetEnvironmentVariableA
TlsFree
Sections
.text Size: 84KB - Virtual size: 83KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 456KB - Virtual size: 452KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 96KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ