Static task
static1
Behavioral task
behavioral1
Sample
ce742c987856cdf423b25590c63d1ada1cf2aebf1ff540fc3af9350287028df2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ce742c987856cdf423b25590c63d1ada1cf2aebf1ff540fc3af9350287028df2.exe
Resource
win10v2004-20220812-en
General
-
Target
ce742c987856cdf423b25590c63d1ada1cf2aebf1ff540fc3af9350287028df2
-
Size
826KB
-
MD5
af70978fb40c501cd08a7d9b7142aad4
-
SHA1
93d699c5f6de93882dcf299a50172188f85e7468
-
SHA256
ce742c987856cdf423b25590c63d1ada1cf2aebf1ff540fc3af9350287028df2
-
SHA512
6257bf843865745c7f8135e3f104890314376fb74ab5933207212e105ba7ae7ea941968196a0d82564dbdb9b77d2756b19f4d200e5d34fa2f8e01e8cad09c7c1
-
SSDEEP
12288:jBSqgdGFWEABGCcVM6zonqyhpdunQqkQ3/PWe81PexKAoR8U8V8XH9KahmyotdJ:jBSvGYSVNzonqyhp7I/uNJteSXdK
Malware Config
Signatures
Files
-
ce742c987856cdf423b25590c63d1ada1cf2aebf1ff540fc3af9350287028df2.exe windows x86
1a2cc7cad810962b427dadcf93cd4ba7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
dbghelp
SymEnumerateSymbolsW
ImageRvaToVa
SymGetSymFromAddr64
SymRegisterCallback
SymGetModuleBase
ImagehlpApiVersionEx
ImageDirectoryEntryToData
SymGetOptions
ImagehlpApiVersion
SymLoadModuleEx
EnumerateLoadedModules64
FindDebugInfoFile
SymLoadModule64
SymMatchString
UnDecorateSymbolName
SymEnumerateSymbols
SymGetLineFromName64
SymGetFileLineOffsets64
SymCleanup
omap
SymRegisterFunctionEntryCallback64
SymFunctionTableAccess64
SymGetModuleInfo
SymUnloadModule
dh
FindDebugInfoFileEx
SymSetSearchPath
MapDebugInformation
SymSetContext
WinDbgExtensionDllInit
kernel32
GetLogicalDrives
WriteConsoleOutputW
LoadLibraryW
BaseUpdateAppcompatCache
ReleaseMutex
OpenConsoleW
ConnectNamedPipe
DeleteTimerQueue
IsWow64Process
SetThreadPriorityBoost
HeapCreate
SetConsoleCursor
VirtualAllocEx
lstrcpynW
SetTermsrvAppInstallMode
CreateTapePartition
GetCalendarInfoA
IsDBCSLeadByte
GetOEMCP
GetShortPathNameW
SetConsoleIcon
GetModuleHandleA
GetPrivateProfileStringW
CopyLZFile
GetThreadLocale
CmdBatNotification
GetNumaNodeProcessorMask
EnumUILanguagesA
BuildCommDCBA
RemoveDirectoryW
AttachConsole
PrivCopyFileExW
GetNamedPipeHandleStateW
SetConsoleTextAttribute
LoadLibraryExA
InterlockedExchangeAdd
GlobalAddAtomA
ReleaseActCtx
GetCurrentDirectoryA
GetConsoleInputExeNameW
SetNamedPipeHandleState
SetConsoleMode
EnterCriticalSection
LZDone
SetCriticalSectionSpinCount
GetHandleInformation
GetUserDefaultUILanguage
TlsFree
SetTimeZoneInformation
BaseCleanupAppcompatCacheSupport
ntdll
NtQueryDefaultUILanguage
NtUnlockVirtualMemory
NtQueryBootOptions
NtQuerySemaphore
ZwIsSystemResumeAutomatic
RtlExpandEnvironmentStrings_U
ZwQueryDirectoryObject
RtlUniform
NtSaveKeyEx
RtlTraceDatabaseValidate
NtSetBootEntryOrder
ZwSetSystemEnvironmentValueEx
ZwTerminateJobObject
RtlRealSuccessor
msvcrt
_vscprintf
_amsg_exit
_y1
_strtoi64
_ismbcl0
__set_app_type
_cwait
__getmainargs
memmove
_winmajor
??4__non_rtti_object@@QAEAAV0@ABV0@@Z
exit
__p__commode
_pwctype
setlocale
?_query_new_mode@@YAHXZ
_mbbtype
_ismbbpunct
_CItanh
_pclose
_adj_fptan
__pxcptinfoptrs
_mbsnbcat
_fdopen
system
_lfind
Sections
.text Size: 404KB - Virtual size: 404KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 137KB - Virtual size: 137KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 157KB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 125KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 876B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ