Static task
static1
Behavioral task
behavioral1
Sample
cc5278242b8a119b0cdcdf10f48269b21fdcecfbb2ac1292b3548a54eaee853b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cc5278242b8a119b0cdcdf10f48269b21fdcecfbb2ac1292b3548a54eaee853b.exe
Resource
win10v2004-20220812-en
General
-
Target
cc5278242b8a119b0cdcdf10f48269b21fdcecfbb2ac1292b3548a54eaee853b
-
Size
280KB
-
MD5
630c1481a23ccb384e983be564b86560
-
SHA1
0c1ea1cfcae42e2c51b8edc11e11272eb044ca87
-
SHA256
cc5278242b8a119b0cdcdf10f48269b21fdcecfbb2ac1292b3548a54eaee853b
-
SHA512
4a41ad29df9f574bbf928de1f08e79d7f23bb5628348402998ebbfc76a49d55ec2a89691f59b570e126ffe614aa1c9e839b99fad851168987067d07245317796
-
SSDEEP
3072:PTfF8DHWIsMNjHVb7D22yPJAANQRU3Cb8Zteb3sPWZY8mgOFPtX1ObdM:PjGTHsMjH121Es3CbLWcOPob+
Malware Config
Signatures
Files
-
cc5278242b8a119b0cdcdf10f48269b21fdcecfbb2ac1292b3548a54eaee853b.exe windows x86
e8d7d979197d57f6ce46e523e30c20f2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathFindFileNameW
psapi
EnumProcesses
GetProcessImageFileNameW
msimg32
GradientFill
kernel32
LocalAlloc
GetCurrentProcess
SetLastError
GetEnvironmentVariableW
lstrcatW
lstrcpyW
GetShortPathNameW
GetModuleFileNameW
lstrlenW
TerminateProcess
OpenProcess
GetCurrentProcessId
GetModuleHandleW
GetProcAddress
CreateProcessW
CopyFileW
GetFullPathNameW
LoadLibraryW
AllocConsole
CreateThread
GetVersionExW
CreateMutexW
CreateProcessA
GetSystemInfo
GetTickCount
QueryPerformanceCounter
GlobalMemoryStatus
FreeLibrary
GetLocaleInfoA
LocalFree
GetStringTypeW
GetStringTypeA
HeapSize
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
LoadLibraryA
InitializeCriticalSection
GetCommandLineW
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
FlushFileBuffers
LCMapStringW
LCMapStringA
GetOEMCP
GetACP
GetCPInfo
MultiByteToWideChar
InterlockedDecrement
GetCurrentThreadId
InterlockedIncrement
TlsFree
GlobalAlloc
GlobalLock
GlobalUnlock
GetLogicalDriveStringsW
GetDriveTypeW
ExitThread
FindFirstFileW
FindNextFileW
FindClose
CreateFileW
GetFileSize
CloseHandle
ReadFile
SetFilePointer
WriteFile
Sleep
MoveFileExW
GetLastError
DeleteFileW
GetSystemTimeAsFileTime
GetLocalTime
CreateFileA
SetEndOfFile
TlsSetValue
TlsAlloc
TlsGetValue
GetConsoleMode
GetConsoleCP
WideCharToMultiByte
GetModuleFileNameA
GetStdHandle
ExitProcess
GetModuleHandleA
VirtualAlloc
DeleteCriticalSection
VirtualFree
HeapCreate
HeapDestroy
GetStartupInfoW
HeapFree
HeapAlloc
HeapReAlloc
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
RtlUnwind
EnterCriticalSection
LeaveCriticalSection
GetVersionExA
GetProcessHeap
user32
SetClipboardData
ShowWindow
SendMessageW
PostMessageW
UpdateWindow
CloseClipboard
LoadCursorW
GetMessageW
TranslateMessage
DispatchMessageW
RegisterClassExW
PostQuitMessage
DefWindowProcW
EnableWindow
PtInRect
SetCursor
GetDC
ReleaseDC
DrawIconEx
GetSystemMenu
EnableMenuItem
CreateWindowExA
SetTimer
LookupIconIdFromDirectoryEx
CreateIconFromResourceEx
DialogBoxIndirectParamW
BeginPaint
EndPaint
DestroyWindow
EndDialog
GetWindowTextA
MessageBoxW
CreateWindowExW
SystemParametersInfoW
GetClientRect
DrawTextW
OpenClipboard
EmptyClipboard
gdi32
GetDIBits
CreateCompatibleBitmap
CreateCompatibleDC
DeleteDC
RoundRect
SetBkMode
SetTextColor
CreateFontW
SelectObject
GetStockObject
DeleteObject
CreateSolidBrush
advapi32
AllocateAndInitializeSid
CheckTokenMembership
FreeSid
RegOpenKeyExW
RegCreateKeyExW
RegSetValueExW
RegCloseKey
OpenProcessToken
GetTokenInformation
GetSidSubAuthority
shell32
ShellExecuteW
SHGetFolderPathW
ShellExecuteExW
ole32
CoInitializeEx
CoCreateInstance
wininet
InternetOpenW
InternetOpenA
InternetConnectA
InternetReadFile
InternetCloseHandle
InternetOpenUrlW
HttpSendRequestA
HttpOpenRequestA
InternetSetCookieW
Sections
.text Size: 212KB - Virtual size: 209KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 804B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ