Static task
static1
Behavioral task
behavioral1
Sample
ce3382608f15bc3e3d26d31a6ef6bd1e37c6be398c6b4886bc7162ab95573e99.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ce3382608f15bc3e3d26d31a6ef6bd1e37c6be398c6b4886bc7162ab95573e99.exe
Resource
win10v2004-20220812-en
General
-
Target
ce3382608f15bc3e3d26d31a6ef6bd1e37c6be398c6b4886bc7162ab95573e99
-
Size
165KB
-
MD5
9e7ee0a868df197fb43ccec40fd01fce
-
SHA1
69bbc1ebca65a7bcb934530c41fe367e8a2faafb
-
SHA256
ce3382608f15bc3e3d26d31a6ef6bd1e37c6be398c6b4886bc7162ab95573e99
-
SHA512
8f7ba58941384f95dfb533ed95ba8492ec415dd37cf05e52ba6d03f339170352286b6e4400a263121919fe68150b43e92a49b05f8a84b102397f36a40ed6a4f2
-
SSDEEP
3072:KpGZsOO0Jta7XHfHnLrwmNOU5YmqaxOoajyW9pjJUSEU3pJ:4SlK7fwmD4CW90SL5J
Malware Config
Signatures
Files
-
ce3382608f15bc3e3d26d31a6ef6bd1e37c6be398c6b4886bc7162ab95573e99.exe windows x86
8fdd1ac1d8786e160ee357e3369c0830
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalFree
GetProcAddress
ExitProcess
LoadLibraryA
CloseHandle
VirtualProtect
ReadFile
LockResource
LoadResource
FindResourceA
SuspendThread
HeapFree
GetProcessHeap
VirtualProtectEx
VirtualAllocEx
GetCurrentProcess
ExitThread
GetModuleHandleA
WriteFile
CreateEventA
CreateMutexA
ReleaseMutex
HeapAlloc
InterlockedExchange
RtlUnwind
VirtualQuery
user32
GetActiveWindow
DefWindowProcA
PostQuitMessage
DestroyWindow
DispatchMessageA
GetMessageA
SetFocus
GetDesktopWindow
GetWindow
PostMessageA
GetForegroundWindow
ShowWindow
CreateDialogParamA
Sections
.text Size: 44KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 116B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 104KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ