Static task
static1
Behavioral task
behavioral1
Sample
ced4ccbb2cf94c8413da7ec41eeb9c404840c50de096a788024e9828db55ca50.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ced4ccbb2cf94c8413da7ec41eeb9c404840c50de096a788024e9828db55ca50.exe
Resource
win10v2004-20221111-en
General
-
Target
ced4ccbb2cf94c8413da7ec41eeb9c404840c50de096a788024e9828db55ca50
-
Size
120KB
-
MD5
9e2d5116462c18c2a8b0dcb7bd88e9ca
-
SHA1
74ca2e701aae44413e3706a37ff44ebbe6c0e19d
-
SHA256
ced4ccbb2cf94c8413da7ec41eeb9c404840c50de096a788024e9828db55ca50
-
SHA512
43da95509dfebfc6908e0fdd27c22c1e4e806b814103cb1c53386e0e4da222c4b918a7050c5eb2941a9110042de0d0f2de95a6086b64b22aebef4ce796344ee3
-
SSDEEP
1536:WlnMg9bWAdy4nHfUHD28+we3cotuFDcF4DfQKRx50KVT4iKEFXvxKqHs:WlNsAdy4n/UKw4co9FMfQeN/Xey
Malware Config
Signatures
Files
-
ced4ccbb2cf94c8413da7ec41eeb9c404840c50de096a788024e9828db55ca50.exe windows x86
65d3499192d0cf1a7f4ab82e4cf927a2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteFile
MapViewOfFile
CreateFileMappingA
CloseHandle
GetFileSize
CreateFileA
SetFileAttributesW
MultiByteToWideChar
lstrlenA
CopyFileA
DeleteFileA
GetFileTime
FindNextFileA
SetFileAttributesA
lstrcpynA
GetDiskFreeSpaceA
GetProcAddress
GetModuleHandleA
ReleaseMutex
WaitForSingleObject
lstrcmpiA
GetModuleFileNameA
GetTempFileNameA
GetTempPathA
ReadFile
SetFilePointer
CreateDirectoryA
GetCurrentProcess
FormatMessageA
GetLastError
ExitProcess
UnmapViewOfFile
SetCurrentDirectoryA
GetWindowsDirectoryA
SetFileTime
SystemTimeToFileTime
CreateProcessA
GetSystemDirectoryA
lstrcmpA
GetVersion
CreateThread
CreateMutexA
CreateSemaphoreA
Sleep
VirtualFree
VirtualAlloc
SizeofResource
LockResource
LoadResource
FindResourceA
GetDriveTypeA
GetLogicalDriveStringsA
ReleaseSemaphore
OpenSemaphoreA
GetComputerNameA
GetShortPathNameA
CompareStringW
SetEnvironmentVariableA
CompareStringA
SetEndOfFile
LoadLibraryA
GetOEMCP
FindFirstFileA
FindClose
GetEnvironmentVariableA
lstrcatA
lstrcpyA
GetSystemTime
SetErrorMode
WinExec
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
FlushFileBuffers
SetStdHandle
GetTimeZoneInformation
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
LCMapStringW
HeapAlloc
GetFileAttributesA
FileTimeToSystemTime
FileTimeToLocalFileTime
RtlUnwind
GetStartupInfoA
GetCommandLineA
HeapDestroy
HeapCreate
HeapFree
HeapReAlloc
TerminateProcess
WideCharToMultiByte
LCMapStringA
user32
PostQuitMessage
wsprintfA
ShowWindow
DialogBoxParamA
EndDialog
advapi32
RegSetValueExA
RegCloseKey
RegRestoreKeyA
RegOpenKeyExA
RegSaveKeyA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegQueryValueExA
shell32
ShellExecuteA
ole32
CoInitialize
CoUninitialize
shlwapi
PathQuoteSpacesA
ws2_32
WSACleanup
inet_addr
gethostbyname
WSAStartup
Sections
.text Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 56KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ezjaxra Size: - Virtual size: 80KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE