Static task
static1
Behavioral task
behavioral1
Sample
ce22edb0858036895b3313767061ff6be84220c17bdef03735395928cb3a1029.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ce22edb0858036895b3313767061ff6be84220c17bdef03735395928cb3a1029.exe
Resource
win10v2004-20230221-en
General
-
Target
ce22edb0858036895b3313767061ff6be84220c17bdef03735395928cb3a1029
-
Size
4.9MB
-
MD5
1ac21fe943b425e7f962d8fa1cada215
-
SHA1
b9b12c6d7e00aad47a602b632a6c36f52dbd27a4
-
SHA256
ce22edb0858036895b3313767061ff6be84220c17bdef03735395928cb3a1029
-
SHA512
51f287acb7836beed45e20451038159f0f37211c02d219a6712e77c11493123bfff46f698f2eba3928d1e9de9813ea4b508f61ee12fe2d8732ef990c561bca79
-
SSDEEP
49152:BIOde3qKI8rqbnaUGI01uCk6xiATyvitLsRacFh4iXw7K6b4rpnTl0nMAhGA2rA:yOd8qiInaUGI01uCk6VLGsiXw71
Malware Config
Signatures
Files
-
ce22edb0858036895b3313767061ff6be84220c17bdef03735395928cb3a1029.exe windows x86
d84db048480b22659d953e50d7756731
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LockFile
OutputDebugStringW
UnlockFileEx
GetProcessHeap
GetSystemTimeAsFileTime
FormatMessageA
InitializeCriticalSection
WideCharToMultiByte
FormatMessageW
HeapDestroy
LeaveCriticalSection
GetFileAttributesA
HeapCreate
HeapValidate
GetFileAttributesW
ReadFile
MultiByteToWideChar
FlushFileBuffers
GetTempPathW
HeapSize
LockFileEx
EnterCriticalSection
GetDiskFreeSpaceW
LoadLibraryA
CreateFileMappingA
CreateFileMappingW
GetDiskFreeSpaceA
GetSystemInfo
GetFileAttributesExW
OutputDebugStringA
GetVersionExA
GetTempPathA
GetSystemTime
AreFileApisANSI
DeleteFileA
CompareStringW
FlushInstructionCache
lstrcmpiW
GetCurrentThreadId
WinExec
GetACP
FindFirstFileW
GetLongPathNameW
ResumeThread
TerminateThread
OpenThread
GetExitCodeThread
SuspendThread
SetFileTime
FindClose
FindNextFileW
GetTempFileNameW
MoveFileExW
CreateDirectoryW
CopyFileW
GetCurrentDirectoryW
MoveFileW
RemoveDirectoryW
GetWindowsDirectoryW
SetFileAttributesW
GetFileTime
SetEvent
ResetEvent
CreateEventW
GlobalUnlock
InterlockedExchangeAdd
QueryDosDeviceW
GetLogicalDriveStringsW
GetVolumeInformationW
GetLocalTime
GetExitCodeProcess
GlobalMemoryStatusEx
GetVersion
InterlockedDecrement
GetCurrentThread
GetComputerNameW
DeviceIoControl
UnlockFile
CreateFileW
GlobalAlloc
WriteFile
GetFileSizeEx
FileTimeToSystemTime
GetEnvironmentVariableW
InterlockedExchange
SetEnvironmentVariableA
WriteConsoleW
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetTimeZoneInformation
GetOEMCP
IsValidCodePage
ReadConsoleW
GetConsoleMode
GetConsoleCP
SetFilePointerEx
GetFileType
GetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
UnhandledExceptionFilter
GetCPInfo
RtlUnwind
LoadLibraryExW
ExitThread
CreateThread
GetCommandLineW
GetModuleHandleExW
ExitProcess
GlobalLock
VirtualFree
VirtualAlloc
IsProcessorFeaturePresent
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
IsDebuggerPresent
GetStringTypeW
EncodePointer
InterlockedCompareExchange
HeapFree
QueryPerformanceCounter
SystemTimeToFileTime
HeapAlloc
WritePrivateProfileStringW
GetModuleFileNameW
GetPrivateProfileStringW
GetProcAddress
GetVersionExW
GetModuleHandleW
GetCurrentProcess
LocalFree
Sleep
GetTickCount
LockResource
SizeofResource
LoadResource
FindResourceW
GetCurrentProcessId
CloseHandle
CreateToolhelp32Snapshot
Process32NextW
WaitForMultipleObjects
Process32FirstW
SetEndOfFile
UnmapViewOfFile
MapViewOfFile
SetFilePointer
GetFileSize
CreateFileA
HeapReAlloc
GetFullPathNameA
GetFullPathNameW
LoadLibraryW
FreeLibrary
ReleaseMutex
SetUnhandledExceptionFilter
CreateMutexW
ExpandEnvironmentStringsW
lstrlenW
DeleteFileW
WaitForSingleObject
CreateProcessW
GlobalFree
TerminateProcess
OpenProcess
SetLastError
DeleteCriticalSection
DecodePointer
GetLastError
RaiseException
InitializeCriticalSectionAndSpinCount
user32
CreateDialogParamW
LoadBitmapW
PeekMessageW
TranslateMessage
SetForegroundWindow
LoadImageW
IsChild
GetMessageW
UnregisterClassW
IsWindow
PostMessageW
SystemParametersInfoW
GetDesktopWindow
ReleaseDC
GetSystemMetrics
IsWindowVisible
DispatchMessageW
GetSystemMenu
DeleteMenu
PostQuitMessage
GetFocus
DrawFocusRect
EndPaint
DestroyWindow
GetDC
GetWindowThreadProcessId
MessageBoxW
FindWindowExW
SendDlgItemMessageW
GetDlgItem
GetWindowTextW
CloseDesktop
IsWindowEnabled
EnumDesktopWindows
CreateDesktopW
GetWindow
GetMonitorInfoW
SetCursor
GetWindowTextLengthW
ScreenToClient
CharNextW
FillRect
SetCapture
DrawTextW
DialogBoxParamW
LoadCursorW
SetFocus
BeginPaint
PtInRect
GetCapture
OffsetRect
GetClassNameW
GetCursorPos
GetActiveWindow
CreateWindowExW
ReleaseCapture
UpdateWindow
CallWindowProcW
DefWindowProcW
ClientToScreen
InvalidateRect
GetSysColor
ShowWindow
EnableWindow
GetDlgCtrlID
MoveWindow
SetTimer
GetWindowRect
KillTimer
GetParent
GetClientRect
LoadIconW
GetWindowLongW
MonitorFromWindow
SetWindowLongW
EndDialog
SetWindowPos
SendMessageW
MapWindowPoints
SetWindowTextW
SetRectEmpty
gdi32
CreateDIBSection
GetDeviceCaps
GetDIBits
CreateDCW
SetBkMode
DeleteObject
SelectObject
DeleteDC
ExtTextOutW
RealizePalette
CreateFontW
SelectPalette
GetObjectW
SetTextAlign
GetStockObject
SetTextColor
CreateSolidBrush
CreateFontIndirectW
CreateCompatibleDC
StretchBlt
advapi32
RegDeleteKeyW
RegCloseKey
RegOpenKeyExW
RegDeleteValueW
RegSetValueExW
OpenProcessToken
GetTokenInformation
AllocateAndInitializeSid
FreeSid
OpenThreadToken
LookupAccountSidW
GetUserNameW
CheckTokenMembership
RegCreateKeyExW
RegQueryValueExW
shell32
SHGetPathFromIDListW
SHGetFileInfoW
SHGetFolderPathW
SHFileOperationW
SHChangeNotify
ShellExecuteExW
SHBrowseForFolderW
ShellExecuteW
SHGetSpecialFolderLocation
ole32
CoInitialize
CoCreateInstance
CoInitializeEx
CoUninitialize
CoTaskMemFree
oleaut32
SysAllocString
VariantClear
VariantInit
SysFreeString
comctl32
_TrackMouseEvent
InitCommonControlsEx
ImageList_Create
wininet
InternetSetOptionW
HttpSendRequestW
InternetOpenW
InternetCloseHandle
HttpEndRequestW
HttpOpenRequestW
HttpQueryInfoW
InternetWriteFile
InternetConnectW
InternetReadFile
InternetCrackUrlW
HttpSendRequestExW
Sections
.text Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 247KB - Virtual size: 246KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2.0MB - Virtual size: 2.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024KB - Virtual size: 471.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 62KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ