Static task
static1
Behavioral task
behavioral1
Sample
2ce00ef881ba66a4d1b3f12d750a5611bf99f3303b0507d969c58367a81b7908.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2ce00ef881ba66a4d1b3f12d750a5611bf99f3303b0507d969c58367a81b7908.exe
Resource
win10v2004-20220812-en
General
-
Target
2ce00ef881ba66a4d1b3f12d750a5611bf99f3303b0507d969c58367a81b7908
-
Size
92KB
-
MD5
3b15fcd32e2ccea61a1872fda91f5890
-
SHA1
8a75f6a4c9016e5d1b3629cdb2bc93aeecc4e875
-
SHA256
2ce00ef881ba66a4d1b3f12d750a5611bf99f3303b0507d969c58367a81b7908
-
SHA512
a80faca4a5c3b0ddab9ffc3a497ae3f0a2fe6139a7a2c4f8e23bd6a119ff08e6ca62da91092c230213020ec630ac832000ef6a887ec378243a3f840dd7665467
-
SSDEEP
1536:1A5Y3TF+lUY+9T/na9iAE0pikJrvvU4F5JkoCpZ39OeLDszy:MUM6nl/napEYikdU4UdjLDN
Malware Config
Signatures
Files
-
2ce00ef881ba66a4d1b3f12d750a5611bf99f3303b0507d969c58367a81b7908.exe windows x86
a9c13041c07c0404f3461ca329be1972
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetLastActivePopup
GetPropA
DeferWindowPos
GetSysColor
GetMenuItemCount
GetForegroundWindow
BeginDeferWindowPos
EnableScrollBar
GetDlgItem
MessageBoxA
GetFocus
IsWindowVisible
GetScrollRange
EnumChildWindows
GetMenuItemID
DispatchMessageW
ClientToScreen
GetMessagePos
CharLowerA
SetWindowTextA
GetClipboardData
CreateIcon
GetKeyState
GetClassLongA
GetIconInfo
DrawMenuBar
GetCursorPos
GetCursor
DrawIconEx
SetTimer
GetClassInfoA
SetWindowPos
GetScrollPos
GetDC
DrawEdge
GetMenu
GetCapture
GetDCEx
GetMenuItemInfoA
GetMenuStringA
CharToOemA
EnumThreadWindows
IsMenu
GetSysColorBrush
EnableMenuItem
GetMenuState
GetClientRect
DrawTextA
ShowWindow
EndPaint
GetActiveWindow
ShowScrollBar
GetWindow
CharLowerBuffA
FindWindowA
SystemParametersInfoA
RegisterClassA
DispatchMessageA
DefFrameProcA
TrackPopupMenu
FillRect
GetParent
DrawFrameControl
GetScrollInfo
DefWindowProcA
IsWindowEnabled
GetDesktopWindow
CallNextHookEx
IsChild
GetForegroundWindow
DrawIconEx
GetClassInfoA
GetMenuItemCount
EqualRect
GetDesktopWindow
CheckMenuItem
SetTimer
DispatchMessageW
GetMenuStringA
GetMenu
BeginDeferWindowPos
GetDlgItem
CreateMenu
DrawEdge
GetActiveWindow
GetDC
GetClassLongA
EnumThreadWindows
EnableWindow
DrawTextA
GetKeyNameTextA
GetMenuState
EndPaint
EndDeferWindowPos
SetWindowLongA
EnumWindows
FrameRect
CreatePopupMenu
CreateWindowExA
DefMDIChildProcA
GetCursor
FindWindowA
BeginPaint
DispatchMessageA
GetSubMenu
DeferWindowPos
SetWindowPos
GetLastActivePopup
IsChild
IsMenu
GetIconInfo
GetMenuItemID
ShowWindow
IsWindowEnabled
DrawFrameControl
GetFocus
GetKeyState
GetWindowTextA
GetSysColorBrush
CallNextHookEx
DefFrameProcA
DrawMenuBar
ShowScrollBar
SetWindowTextA
CallWindowProcA
GetParent
EnableMenuItem
GetScrollRange
CharLowerBuffA
DrawIcon
GetScrollPos
TrackPopupMenu
comdlg32
ChooseColorA
GetSaveFileNameA
GetSaveFileNameA
GetOpenFileNameA
GetFileTitleA
GetSaveFileNameA
FindTextA
gdi32
SelectPalette
CreateDIBitmap
GetObjectA
SetBkColor
GetCurrentPositionEx
shell32
SHGetFileInfoA
SHDefExtractIconA
kernel32
SetEndOfFile
ExitProcess
WaitForSingleObject
LockResource
GlobalDeleteAtom
GetFileType
LoadLibraryA
EnumCalendarInfoA
MulDiv
FindResourceA
GlobalAddAtomA
GetSystemDefaultLangID
GetFullPathNameA
CompareStringA
FormatMessageA
LoadResource
VirtualAlloc
GetCurrentThread
GetEnvironmentStrings
EnterCriticalSection
CreateEventA
SizeofResource
GetFileSize
WriteFile
DeleteCriticalSection
GetCurrentProcessId
GetCurrentProcess
VirtualFree
lstrcpyA
SetLastError
FreeResource
GetProcessHeap
GetStartupInfoA
lstrlenA
GetDiskFreeSpaceA
MoveFileA
GetVersionExA
SetErrorMode
GetLocalTime
MoveFileExA
GetCurrentThreadId
GetLastError
GlobalAlloc
GetCommandLineA
GetCPInfo
lstrcmpiA
SetFilePointer
HeapAlloc
GetStringTypeA
LocalFree
CloseHandle
Sleep
GlobalFindAtomA
GetLocaleInfoA
GetModuleFileNameA
GetFileAttributesA
GetUserDefaultLCID
LocalReAlloc
SetThreadLocale
ExitThread
SetHandleCount
GetVersion
GetTickCount
GetThreadLocale
VirtualQuery
RaiseException
CreateThread
InitializeCriticalSection
GetStdHandle
FindClose
GetACP
LocalAlloc
HeapDestroy
lstrcpynA
VirtualQuery
GetStartupInfoA
GetFullPathNameA
SetEndOfFile
GetLocaleInfoA
GlobalAddAtomA
GetCPInfo
lstrlenA
SetErrorMode
LocalAlloc
FindResourceA
FreeResource
HeapDestroy
WideCharToMultiByte
GetCommandLineA
FindFirstFileA
GlobalFindAtomA
GetTickCount
SetHandleCount
EnumCalendarInfoA
FormatMessageA
GetCurrentProcessId
GetACP
ExitThread
Sleep
DeleteCriticalSection
GetFileAttributesA
lstrcatA
GlobalDeleteAtom
GetStringTypeW
GetUserDefaultLCID
GetVersionExA
CompareStringA
LoadLibraryA
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
shlwapi
StrToInt64ExA
advapi32
RegEnumKeyA
RegOpenKeyA
msvcrt
_unlock
time
tolower
_itow
rand
_wfopen
wcstol
ole32
CoDisconnectObject
CreateOleAdviseHolder
WriteClassStm
Sections
.CODE Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 67KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.init Size: 1024B - Virtual size: 805B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 571B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ