Static task
static1
Behavioral task
behavioral1
Sample
cce3ea247bdfbe9e6a5cf16ca0b08beb9201f4d0c85dacdb1c8f5408992e2ab8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cce3ea247bdfbe9e6a5cf16ca0b08beb9201f4d0c85dacdb1c8f5408992e2ab8.exe
Resource
win10v2004-20220812-en
General
-
Target
cce3ea247bdfbe9e6a5cf16ca0b08beb9201f4d0c85dacdb1c8f5408992e2ab8
-
Size
93KB
-
MD5
64bd52d0eb22a37969ed03941b13a836
-
SHA1
d167cdb1606eb01e04c7fcfc090be558a67d9d9c
-
SHA256
cce3ea247bdfbe9e6a5cf16ca0b08beb9201f4d0c85dacdb1c8f5408992e2ab8
-
SHA512
7c6d779480a57e962ed301ba2159f33034927d5af8176cd8971bd3966393ae5c756d536a53de856d4626f71f9e708a560cd21de7f2872665119d4ac7dad8b097
-
SSDEEP
1536:PH5AC1sSCpsWVmDq1/yBPvpxOIEVtXulmHESoKny6psx5SxV:eSwVcq9OvTOIELZHEXK9s3Sx
Malware Config
Signatures
Files
-
cce3ea247bdfbe9e6a5cf16ca0b08beb9201f4d0c85dacdb1c8f5408992e2ab8.exe windows x86
72453cdf09f39da7c629ed560f8934df
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlenW
ReleaseMutex
HeapCreate
GetCurrentThreadId
LocalFree
LoadLibraryW
ReleaseMutex
FindAtomA
WriteFile
GetPrivateProfileStringA
GetFileTime
InitializeCriticalSection
FindClose
GetEnvironmentVariableW
TlsGetValue
GlobalFlags
CreateEventW
GetDriveTypeA
GetCurrentProcessId
IsBadStringPtrW
user32
DrawTextA
DrawStateW
IsWindow
DispatchMessageA
GetSysColor
SetFocus
EndDialog
GetKeyboardType
CreateWindowExA
GetClassInfoA
GetSysColor
CallWindowProcW
GetClientRect
rastapi
DeviceDone
DeviceDone
DeviceDone
DeviceDone
DeviceDone
clbcatq
DllGetClassObject
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 109KB - Virtual size: 109KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE