Static task
static1
Behavioral task
behavioral1
Sample
dcc42ca3b4667773a73b51c12f11797746fecc8036a68affaaade238d528aae2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dcc42ca3b4667773a73b51c12f11797746fecc8036a68affaaade238d528aae2.exe
Resource
win10v2004-20220812-en
General
-
Target
dcc42ca3b4667773a73b51c12f11797746fecc8036a68affaaade238d528aae2
-
Size
737KB
-
MD5
60c583d7ecb6ccdd95ee4913225247a7
-
SHA1
1eb78573b33547d2eb1ad8045c40e26c4bf326bf
-
SHA256
dcc42ca3b4667773a73b51c12f11797746fecc8036a68affaaade238d528aae2
-
SHA512
338fbe5a8a3a5d52eb41083cbcd7be3e4e3293113763366ca39e733dc77abd748f428296d281f86079254f69e0d4cc7d130f54436c026ba522454fb721eda5e9
-
SSDEEP
12288:jZE05Qicx8Jlg2qAkw5fEpR4fkmbC1IdykajiV7itMx3L78zCUchecNt0VP:jjYx8JlT55JXb9dyT+V7itMxsz+heTVP
Malware Config
Signatures
Files
-
dcc42ca3b4667773a73b51c12f11797746fecc8036a68affaaade238d528aae2.exe windows x86
08dab69a853b69ebbfb3b36c01f5602b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
DeleteObject
BitBlt
CreateCompatibleDC
kernel32
GetVersion
GetCurrentThreadId
GetCurrentThread
GetModuleHandleA
GetLastError
GetCurrentProcessId
GetTickCount
GetCommandLineA
ExitProcess
VirtualAlloc
GetOEMCP
Sleep
VirtualFree
HeapCreate
SizeofResource
GetModuleHandleW
GetACP
lstrcpynA
CloseHandle
ReadFile
SetFilePointer
TlsFree
RaiseException
HeapSize
WideCharToMultiByte
LockResource
GetEnvironmentStrings
GetEnvironmentStringsW
GetConsoleCP
GlobalFree
lstrlenA
GetSystemInfo
LCMapStringW
LeaveCriticalSection
CreateFileA
TlsSetValue
GetFileType
CreateEventA
CreateFileW
GetTimeZoneInformation
WaitForMultipleObjects
FindFirstFileW
ResetEvent
GetProcessHeap
GetProcAddress
DeleteFileA
GetFileSize
GetStartupInfoA
LoadLibraryA
GetVersionExA
VirtualProtect
TlsAlloc
QueryPerformanceCounter
SetEvent
GetVersionExW
lstrcmpiA
SetHandleCount
EnterCriticalSection
HeapFree
WriteConsoleW
InterlockedIncrement
GetLocaleInfoA
SetEndOfFile
TerminateProcess
SetEnvironmentVariableA
CreateThread
CreateMutexA
GetLocalTime
MultiByteToWideChar
TlsGetValue
UnhandledExceptionFilter
GetModuleFileNameA
FlushFileBuffers
HeapAlloc
IsDebuggerPresent
SetLastError
FormatMessageA
InterlockedDecrement
FindClose
LoadResource
InitializeCriticalSection
FormatMessageW
LocalFree
FreeLibrary
GetStringTypeW
HeapReAlloc
GetSystemTimeAsFileTime
WriteFile
InterlockedExchange
LoadLibraryW
GetCPInfo
GetTempPathA
SetStdHandle
FreeEnvironmentStringsW
LocalAlloc
GetCurrentDirectoryA
GetCurrentProcess
DeleteCriticalSection
FreeEnvironmentStringsA
GetFileAttributesW
HeapDestroy
FindNextFileA
WaitForSingleObject
GetFileAttributesA
GetConsoleOutputCP
GetStdHandle
user32
SetCursor
CallWindowProcA
InvalidateRect
GetSysColor
SetDlgItemTextA
GetFocus
GetDesktopWindow
LoadIconA
ScreenToClient
GetDlgItem
SetWindowTextA
EndDialog
SetWindowLongA
GetWindowRect
GetSystemMetrics
FillRect
CreateWindowExA
GetWindowLongA
IsIconic
LoadStringA
GetWindow
ShowWindow
UpdateWindow
GetParent
DestroyWindow
ClientToScreen
TranslateMessage
UnregisterClassA
GetDC
EndPaint
DispatchMessageA
SetWindowPos
PostQuitMessage
MoveWindow
Sections
.text Size: 693KB - Virtual size: 1019KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ