Static task
static1
Behavioral task
behavioral1
Sample
ce6f72f0130cb8eeb7844fdf97250c8045bde70d5ca44d821a8dfc90d64a8a37.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ce6f72f0130cb8eeb7844fdf97250c8045bde70d5ca44d821a8dfc90d64a8a37.exe
Resource
win10v2004-20220812-en
General
-
Target
ce6f72f0130cb8eeb7844fdf97250c8045bde70d5ca44d821a8dfc90d64a8a37
-
Size
128KB
-
MD5
11b826525ef7579b56e23da4c5844f5a
-
SHA1
7ae455e9e94a3828741ecaf0f0cb9ab74d1a908d
-
SHA256
ce6f72f0130cb8eeb7844fdf97250c8045bde70d5ca44d821a8dfc90d64a8a37
-
SHA512
e5a8c1fe423595e6d8d6651eaaae7829825cbe98e8d58319cc141e13a3bb12837ceba2eb70a424e9113ae4f9a2c1f7deacf0d89b8c3c1891ad42f356846e81bb
-
SSDEEP
3072:/1Q1s4Rcb1efrFASueWbElaltltcPaUPaUPaUPaUPaUPa:mRcb1efrFweWRVcVVVVV
Malware Config
Signatures
Files
-
ce6f72f0130cb8eeb7844fdf97250c8045bde70d5ca44d821a8dfc90d64a8a37.exe windows x86
2ae7930a98180a92749c59562506c8a6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindNextFileW
FindFirstFileW
CopyFileW
MoveFileExW
GetSystemDirectoryW
Sleep
GlobalAddAtomW
CreateProcessW
GlobalFindAtomW
GlobalDeleteAtom
GetLogicalDrives
FindClose
GetModuleFileNameW
GetDriveTypeW
GetCurrentDirectoryW
GetLocalTime
CreateDirectoryW
CloseHandle
WriteFile
CreateFileW
SetErrorMode
CompareStringW
CompareStringA
SetFileAttributesW
SetCurrentDirectoryW
DeleteFileW
RtlUnwind
ExitProcess
RaiseException
HeapAlloc
HeapFree
ExitThread
GetCurrentThreadId
GetLastError
CreateThread
GetModuleHandleA
GetStartupInfoW
GetVersionExA
TlsAlloc
SetLastError
GetCurrentThread
TlsFree
TlsSetValue
TlsGetValue
GetProcAddress
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleFileNameA
EnterCriticalSection
LeaveCriticalSection
SetUnhandledExceptionFilter
DeleteCriticalSection
FatalAppExitA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
IsBadWritePtr
TerminateProcess
GetCurrentProcess
HeapSize
UnhandledExceptionFilter
GetStdHandle
FreeEnvironmentStringsA
MultiByteToWideChar
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
IsBadReadPtr
IsBadCodePtr
GetACP
GetOEMCP
GetCPInfo
LoadLibraryA
InterlockedExchange
VirtualQuery
SetStdHandle
FlushFileBuffers
InitializeCriticalSection
LCMapStringA
WideCharToMultiByte
LCMapStringW
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
GetStringTypeA
GetStringTypeW
SetFilePointer
SetConsoleCtrlHandler
SetEndOfFile
ReadFile
VirtualProtect
GetSystemInfo
GetTimeZoneInformation
GetLocaleInfoW
SetEnvironmentVariableA
user32
wsprintfW
advapi32
RegSetValueExW
RegOpenKeyExW
Sections
.text Size: 80KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE