Static task
static1
Behavioral task
behavioral1
Sample
0cc17d08638c2e1e89b0cc69589e940f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0cc17d08638c2e1e89b0cc69589e940f.exe
Resource
win10v2004-20220812-en
General
-
Target
0cc17d08638c2e1e89b0cc69589e940f.exe
-
Size
816KB
-
MD5
0cc17d08638c2e1e89b0cc69589e940f
-
SHA1
16311fc8ae1867793b46efa035bc626010c6301c
-
SHA256
2bc17ebe903b49885f30864269e50d998ff8fe60a027dbeda54b0600bca35a95
-
SHA512
87ef7644e0cf8bef978abe2d01294127a8a6f0addd5aded75e40520dec0661a1ae4cea8a6adf1f3ec83317d18da656f4280ba58f93754e8f58156cbb41aca4ce
-
SSDEEP
24576:fhSyEp0kMVVQwka5a9dfLZEGWoGKpMBMxwYf/yeksRppb4qpejbEQVNhG:fBEp0Ywka5a9dfLZEGWoGKpMBMRRppsX
Malware Config
Signatures
Files
-
0cc17d08638c2e1e89b0cc69589e940f.exe.exe windows x86
15145246279dbac9c0f3d99a59f6d9e1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
QueryDosDeviceA
LocalFree
SetProcessPriorityBoost
VirtualQuery
GlobalGetAtomNameW
FindResourceA
GetComputerNameExW
GetModuleHandleA
GetTempPathA
BuildCommDCBAndTimeoutsW
GetProcAddress
VirtualProtect
OpenJobObjectW
_lwrite
UnlockFile
GetPrivateProfileStructA
GetDiskFreeSpaceExW
DefineDosDeviceA
SetVolumeMountPointW
GetAtomNameA
FlushConsoleInputBuffer
EnumResourceLanguagesA
GetCPInfoExW
GetThreadContext
lstrlenW
GetProcessAffinityMask
SetConsoleWindowInfo
CreateJobSet
CopyFileW
lstrcpynA
WriteConsoleA
GetCommandLineA
GetLastError
GetCommandLineW
InterlockedIncrement
FormatMessageW
CreateJobObjectW
InitializeCriticalSection
FindNextVolumeA
SetConsoleCursorInfo
LoadLibraryW
VerifyVersionInfoA
AddAtomW
InterlockedDecrement
LoadLibraryA
FoldStringA
GetDefaultCommConfigW
GetConsoleAliasesLengthW
lstrcpyA
TerminateThread
HeapFree
SetCriticalSectionSpinCount
GetComputerNameA
EnumSystemLocalesW
DisableThreadLibraryCalls
OpenMutexA
LocalFileTimeToFileTime
SearchPathA
SetProcessShutdownParameters
CreateMutexA
FormatMessageA
InterlockedCompareExchange
EnumDateFormatsW
GetConsoleScreenBufferInfo
LocalAlloc
SetFileShortNameA
EnumCalendarInfoExW
GetFileAttributesA
GetSystemWindowsDirectoryA
GetAtomNameW
ReadConsoleInputA
EnumDateFormatsA
_hwrite
GetConsoleAliasA
GetQueuedCompletionStatus
lstrcatW
GetDefaultCommConfigA
GetFullPathNameW
DebugBreakProcess
AddAtomA
SetCurrentDirectoryW
SetCalendarInfoW
GetProfileSectionW
FindNextFileA
SetHandleCount
MoveFileWithProgressW
ReadConsoleOutputCharacterW
CopyFileExW
WriteProfileSectionW
GetModuleHandleW
Sleep
ExitProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
MoveFileA
DeleteFileA
RaiseException
GetStartupInfoA
HeapValidate
IsBadReadPtr
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetModuleFileNameW
TlsGetValue
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
SetLastError
GetModuleFileNameA
WriteFile
GetStdHandle
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
InitializeCriticalSectionAndSpinCount
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
GetFileType
HeapDestroy
HeapCreate
VirtualFree
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
RtlUnwind
DebugBreak
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
FlushFileBuffers
GetConsoleCP
GetConsoleMode
ReadFile
SetFilePointer
CloseHandle
SetStdHandle
GetConsoleOutputCP
CreateFileA
gdi32
GetCharWidth32A
GetBoundsRect
GetCharWidthW
SelectObject
advapi32
RevertToSelf
Sections
.text Size: 196KB - Virtual size: 196KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 598KB - Virtual size: 4.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ