Static task
static1
Behavioral task
behavioral1
Sample
cde30db13fd9fa8a2af6ab0e512c986213750ff54bd5dcd1aa0b596fc3437b5e.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
cde30db13fd9fa8a2af6ab0e512c986213750ff54bd5dcd1aa0b596fc3437b5e.exe
Resource
win10v2004-20230220-en
General
-
Target
cde30db13fd9fa8a2af6ab0e512c986213750ff54bd5dcd1aa0b596fc3437b5e
-
Size
1.4MB
-
MD5
073681eb5a2d8c9b2ea2e7a2e2b5273c
-
SHA1
2675e064681251928cefb65d927c684c5b1da05b
-
SHA256
cde30db13fd9fa8a2af6ab0e512c986213750ff54bd5dcd1aa0b596fc3437b5e
-
SHA512
9de639dc6bd02e922fbfbf96a6de7789374a1437d97957bc83a19bfa5e7cb7687410beacc94dbd1385db745286624995f7b588b3266f7b7dd3be34beb444ef6f
-
SSDEEP
24576:GgZxS3MkJvcgDkMwIspSoHSLU1Fa8ZUTE+Rt+jQBViZRzHIXTyohr:XfSzcAAHThjKVuIT
Malware Config
Signatures
Files
-
cde30db13fd9fa8a2af6ab0e512c986213750ff54bd5dcd1aa0b596fc3437b5e.exe windows x86
c6d881c326b223fe767283de7ef0bb3e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
IsBadWritePtr
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
SetUnhandledExceptionFilter
GetCurrentProcessId
GetStringTypeA
GetStringTypeW
SetStdHandle
VirtualFree
LCMapStringW
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
HeapCreate
GetProfileStringA
HeapDestroy
UnhandledExceptionFilter
GetTimeZoneInformation
GetACP
HeapSize
HeapReAlloc
RaiseException
ExitProcess
GetCommandLineA
GetStartupInfoA
HeapAlloc
HeapFree
ExitThread
CreateThread
GetDriveTypeA
RtlUnwind
GetFileAttributesA
GetFullPathNameA
SetEndOfFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
CreateFileA
SetErrorMode
FileTimeToLocalFileTime
FileTimeToSystemTime
GetCurrentDirectoryA
GetOEMCP
GetCPInfo
GetProcessVersion
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalAlloc
GlobalFlags
LocalFree
lstrcpynA
MulDiv
SetLastError
lstrcmpA
GetCurrentThread
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
InterlockedDecrement
InterlockedIncrement
GetVersion
lstrcatA
GetCurrentThreadId
GlobalGetAtomNameA
lstrcmpiA
GlobalAddAtomA
GlobalFindAtomA
GetPrivateProfileStringA
GlobalDeleteAtom
lstrcpyA
GetModuleHandleA
FindResourceA
GetTickCount
ResumeThread
WaitForSingleObject
GlobalLock
GlobalUnlock
SizeofResource
LoadResource
LockResource
GlobalAlloc
GlobalFree
WinExec
GetWindowsDirectoryA
GetCurrentProcess
CloseHandle
TerminateProcess
CreateDirectoryA
GetModuleFileNameA
Sleep
GetLocalTime
DeleteFileA
RemoveDirectoryA
FindFirstFileA
FindNextFileA
FindClose
GetPrivateProfileIntA
GetVersionExA
GetTempPathA
FreeLibrary
LoadLibraryA
GetProcAddress
CreateMutexA
GetLastError
WritePrivateProfileStringA
LCMapStringA
user32
GetWindowDC
BeginPaint
EndPaint
TabbedTextOutA
GrayStringA
LoadStringA
GetClassNameA
GetSysColorBrush
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
GetDlgItemTextA
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
UpdateWindow
SendDlgItemMessageA
MapWindowPoints
GetFocus
SetFocus
AdjustWindowRectEx
IsWindowVisible
GetTopWindow
MessageBoxA
GetCapture
WinHelpA
wsprintfA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemID
TrackPopupMenu
GetWindowTextLengthA
PostQuitMessage
GetDlgCtrlID
DefWindowProcA
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowPos
IntersectRect
SystemParametersInfoA
GetWindowPlacement
EndDialog
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetDlgItem
IsWindowEnabled
DrawTextA
FrameRect
LoadImageA
DrawStateA
OffsetRect
CopyRect
DrawFocusRect
TrackPopupMenuEx
PostMessageA
ClientToScreen
WindowFromPoint
GetActiveWindow
GetNextDlgTabItem
GetWindowLongA
DestroyIcon
DestroyMenu
GetIconInfo
CreateIconIndirect
LoadCursorA
CopyIcon
GetParent
GetDC
ReleaseDC
InflateRect
RedrawWindow
IsWindow
GetSysColor
SendMessageA
UnregisterClassA
HideCaret
ShowCaret
ExcludeUpdateRgn
DefDlgProcA
CharNextA
IsWindowUnicode
LoadIconA
SetCursor
GetMessagePos
ScreenToClient
PtInRect
SetTimer
MessageBeep
SetWindowLongA
KillTimer
DestroyCursor
RegisterWindowMessageA
FillRect
InvalidateRect
MapDialogRect
GetAsyncKeyState
GetMessageA
ValidateRect
ShowWindow
GetWindowTextA
MoveWindow
GetWindowRect
GetCursorPos
LoadMenuA
EnableMenuItem
GetSubMenu
GetKeyState
PeekMessageA
TranslateMessage
DispatchMessageA
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
EnableWindow
GetMenuItemCount
gdi32
PatBlt
CreateDIBSection
RealizePalette
RestoreDC
SetStretchBltMode
GetClipBox
SaveDC
RectVisible
StretchDIBits
SetBkMode
PlayEnhMetaFile
SelectPalette
CreatePalette
GetEnhMetaFilePaletteEntries
ExtTextOutA
SetWinMetaFileBits
GetEnhMetaFileHeader
SetEnhMetaFileBits
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
CreateMetaFileA
ScaleWindowExtEx
IntersectClipRect
MoveToEx
LineTo
PtVisible
TextOutA
Escape
CloseMetaFile
DeleteMetaFile
GetDeviceCaps
CreateEnhMetaFileA
CreatePen
Rectangle
CloseEnhMetaFile
DeleteEnhMetaFile
GetPixel
SetPixel
CreateBitmap
SelectObject
SetBkColor
SetTextColor
DeleteDC
BitBlt
CreateCompatibleDC
GetDIBits
CreateCompatibleBitmap
SetDIBits
DeleteObject
GetTextExtentPoint32A
CreateSolidBrush
GetStockObject
GetObjectA
SetWindowExtEx
CreateDIBitmap
GetTextExtentPointA
CreateFontIndirectA
comdlg32
ChooseColorA
GetOpenFileNameA
GetSaveFileNameA
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
advapi32
RegCloseKey
RegQueryValueA
RegOpenKeyExA
RegCreateKeyExA
RegSetValueExA
shell32
ShellExecuteExA
SHBrowseForFolderA
SHGetPathFromIDListA
DragQueryFileA
SHGetSpecialFolderPathA
ShellExecuteA
comctl32
_TrackMouseEvent
ord17
PropertySheetA
DestroyPropertySheetPage
CreatePropertySheetPageA
ImageList_Destroy
winmm
PlaySoundA
ws2_32
htons
ntohl
htonl
ntohs
Sections
.text Size: 1.0MB - Virtual size: 1.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 184KB - Virtual size: 182KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 88KB - Virtual size: 130KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 96KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ