Static task
static1
Behavioral task
behavioral1
Sample
deceae9542bf1840f60a68d711ddd7f8371d71762d412cc416242261d8b5d1d5.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
deceae9542bf1840f60a68d711ddd7f8371d71762d412cc416242261d8b5d1d5.exe
Resource
win10v2004-20220812-en
General
-
Target
deceae9542bf1840f60a68d711ddd7f8371d71762d412cc416242261d8b5d1d5
-
Size
229KB
-
MD5
decf4cbb1bf83a1593b37012ed0138d8
-
SHA1
f5f30a3656b752f461c2285788a9bc1dcc58c2f1
-
SHA256
deceae9542bf1840f60a68d711ddd7f8371d71762d412cc416242261d8b5d1d5
-
SHA512
9d51b1ac9dde6db95a3544a240d25bad1714bcc8e8b672b0ab804ba45b90f7b5071125a3d49c390b851f4bcc25eab72b7cf76be13c184f6a1a6bdb6c888af220
-
SSDEEP
6144:Tf9pMMnMMMMMavy0AClXeeKiYr/yiAbHM/WHj65KOMjaNpzmQJ1RH2b:TrMMnMMMMMUrXfKiYbnAbHMSCKOMjuxC
Malware Config
Signatures
Files
-
deceae9542bf1840f60a68d711ddd7f8371d71762d412cc416242261d8b5d1d5.exe windows x86
4fb42841d72a86ca73e7105d3f28604b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ddraw
DirectDrawCreate
rpcrt4
RpcBindingSetAuthInfoW
I_RpcBindingIsClientLocal
RpcBindingSetAuthInfoExW
NdrClientCall2
RpcSsDestroyClientContext
RpcBindingToStringBindingW
NDRCContextBinding
RpcBindingFromStringBindingW
I_RpcExceptionFilter
RpcBindingSetAuthInfoExA
UuidToStringW
RpcRaiseException
RpcStringBindingParseW
UuidCreate
RpcEpResolveBinding
RpcBindingSetAuthInfoA
RpcImpersonateClient
RpcStringFreeW
I_RpcMapWin32Status
UuidFromStringW
RpcRevertToSelf
RpcStringBindingComposeW
RpcBindingFree
kernel32
FormatMessageW
GetModuleHandleA
OutputDebugStringW
GetComputerNameW
GetProcessHeap
InitializeCriticalSection
GetLogicalDriveStringsW
GetVersionExA
EnterCriticalSection
OpenFile
Sleep
AreFileApisANSI
lstrcmpiW
ExpandEnvironmentStringsW
GetFileSize
InterlockedExchange
OpenMutexW
SetThreadPriority
GetFileAttributesExW
IsBadWritePtr
DeviceIoControl
QueryPerformanceCounter
GetDriveTypeW
CreateFileMappingA
CreateProcessInternalW
GetLocalTime
SearchPathW
FreeLibrary
LoadLibraryExW
CreateEventA
HeapAlloc
GetPriorityClass
CreateFileA
RaiseException
_lclose
CopyFileW
ResumeThread
FindFirstFileExW
GetProfileIntA
GetSystemWindowsDirectoryW
GetModuleHandleW
MoveFileW
GetLastError
InterlockedIncrement
GlobalMemoryStatus
LeaveCriticalSection
SetUnhandledExceptionFilter
GetFileTime
ReadProcessMemory
OpenEventW
ExitThread
GetSystemInfo
CreateFileW
LocalAlloc
DeleteFileW
GetTimeZoneInformation
SizeofResource
WriteFile
DuplicateHandle
GetDiskFreeSpaceW
VirtualFree
FindResourceExW
GetLongPathNameW
GetCurrentProcessId
SetLastError
InterlockedDecrement
GetFullPathNameA
SetFilePointer
CreateEventW
VirtualAlloc
GetPrivateProfileStringW
MultiByteToWideChar
WaitForMultipleObjectsEx
InterlockedExchangeAdd
SetErrorMode
HeapFree
FindNextFileW
CloseHandle
ResetEvent
GetCurrentThread
GetDiskFreeSpaceExW
GetUserDefaultUILanguage
SleepEx
GetModuleHandleExW
GetCommandLineW
FindFirstFileW
lstrcatW
GetProfileStringA
GetModuleFileNameW
GetCurrentProcess
GetComputerNameExW
ReadFile
CreateFileMappingW
GetFullPathNameW
GetComputerNameA
DeleteCriticalSection
CreateThread
SetEvent
SetNamedPipeHandleState
UnmapViewOfFile
GetOverlappedResult
CancelIo
GetTickCount
lstrcpyW
CreateMutexA
OpenProcess
CreateProcessInternalA
GetProcAddress
lstrcpyA
GetVolumeInformationW
LocalFree
lstrcmpW
ReleaseMutex
WritePrivateProfileStringW
MapViewOfFile
lstrlenA
WaitForSingleObject
LoadLibraryW
LoadLibraryA
GetSystemTimeAsFileTime
UnhandledExceptionFilter
DelayLoadFailureHook
GetFileSizeEx
CompareFileTime
EnumUILanguagesW
GetFileAttributesW
GetSystemTime
lstrcpynW
LoadResource
ExpandEnvironmentStringsA
WideCharToMultiByte
InterlockedCompareExchange
GetWindowsDirectoryW
lstrlenW
GetPrivateProfileIntW
FindClose
TerminateProcess
FindResourceA
CreateMutexW
GetCurrentThreadId
GetSystemDirectoryW
LocalReAlloc
WaitNamedPipeW
ntdll
NtWaitForSingleObject
RtlAdjustPrivilege
Sections
.text Size: 4KB - Virtual size: 876B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 60KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 440KB - Virtual size: 2.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ