Static task
static1
Behavioral task
behavioral1
Sample
ccf9f6e104a87d3141c00dc5504d316ee768fe6793cf586c92536b340fa6d487.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ccf9f6e104a87d3141c00dc5504d316ee768fe6793cf586c92536b340fa6d487.exe
Resource
win10v2004-20220812-en
General
-
Target
ccf9f6e104a87d3141c00dc5504d316ee768fe6793cf586c92536b340fa6d487
-
Size
50KB
-
MD5
6805240e93eab6f35b3fe30080fb47b0
-
SHA1
32490f6f07df85c197d7ba56658e9bf0ba07c9fa
-
SHA256
ccf9f6e104a87d3141c00dc5504d316ee768fe6793cf586c92536b340fa6d487
-
SHA512
369c68644772f6564b3e5e4b345ab5f7cd5895c2278f7f22f14faf00ae3447145d7e7f2c7e20fc9438c864b45a9b9dfac0543659b1805dc982a36fa82ebddceb
-
SSDEEP
1536:B0yzQl2AK+dUQhElAwFcA6NPokGIX+HORRNM7l3jgA:yXlZxPhEzcA4FwORs7lM
Malware Config
Signatures
Files
-
ccf9f6e104a87d3141c00dc5504d316ee768fe6793cf586c92536b340fa6d487.exe windows x86
979147906f3d13ee29570e247acf8fd2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msi
MsiDatabaseExportA
MsiGetComponentPathW
MsiOpenDatabaseW
MsiDatabaseCommit
MsiDoActionA
MsiGetSummaryInformationA
MsiReinstallProductW
MsiGetFeatureStateW
MsiProcessAdvertiseScriptA
MsiEnumFeaturesW
MsiGetFileHashW
MsiSummaryInfoGetPropertyW
MsiNotifySidChangeW
MsiRecordGetStringW
MsiDatabaseMergeW
kernel32
Module32NextW
GlobalHandle
DeleteFileA
QueryDosDeviceA
ReadConsoleA
GetEnvironmentStringsW
EnumLanguageGroupLocalesW
DebugActiveProcess
ResumeThread
LoadLibraryA
DosDateTimeToFileTime
FreeConsole
FoldStringA
ReadConsoleOutputCharacterW
WriteConsoleOutputW
GetStringTypeExA
CreateActCtxW
UpdateResourceW
GetPrivateProfileSectionNamesA
ReleaseSemaphore
GetSystemDirectoryA
IsBadStringPtrA
RegisterWaitForSingleObject
VirtualAlloc
SetComputerNameExA
MapViewOfFile
SetConsoleCursor
GetComputerNameA
MulDiv
GlobalDeleteAtom
DefineDosDeviceW
GetThreadPriorityBoost
LoadModule
SetTapePosition
GetConsoleCursorInfo
BaseFlushAppcompatCache
OpenProfileUserMapping
DuplicateHandle
RtlZeroMemory
PulseEvent
ReadConsoleOutputAttribute
GetTapeParameters
cryptui
CryptUIDlgViewCertificateA
EnrollmentCOMObjectFactory_getInstance
CryptUIWizCertRequest
CryptUIDlgSelectStoreA
CryptUIDlgViewSignerInfoA
CryptUIWizSubmitCertRequestNoDS
CryptUIWizQueryCertRequestNoDS
CryptUIDlgViewCertificateW
CryptUIWizExport
CryptUIDlgViewCRLA
CryptUIGetCertificatePropertiesPagesW
CryptUIDlgViewCertificatePropertiesA
CryptUIWizCreateCertRequestNoDS
CryptUIDlgViewCTLA
CryptUIFreeCertificatePropertiesPagesW
I_CryptUIProtectFailure
CryptUIDlgViewCertificatePropertiesW
LocalEnrollNoDS
CryptUIWizFreeDigitalSignContext
CryptUIGetViewSignaturesPagesW
CryptUIDlgViewCTLW
oleaut32
VarUI8FromDisp
VarDateFromBool
VariantInit
VarR8FromI1
SafeArrayCopyData
VarCyMulI8
VarI1FromStr
VarCyFromDisp
GetActiveObject
VarDateFromUdateEx
OleLoadPictureFileEx
SysReAllocString
VarCyCmp
VarInt
VarUI1FromBool
SafeArraySetRecordInfo
VarR8FromI8
VarI1FromUI4
VarR4FromBool
msdart
?DeleteIf@CLKRLinearHashTable@@QAEKP6G?AW4LK_PREDICATE@@PBXPAX@Z1@Z
?_InsertThisIntoGlobalList@CLKRLinearHashTable@@AAEXXZ
?ValidSignature@CLKRLinearHashTable@@QBE_NXZ
?First@CLockedDoubleList@@QAEQAVCListEntry@@XZ
?IsWinNT4@CMdVersionInfo@@SAHXZ
?IsWriteLocked@CReaderWriterLock@@QBE_NXZ
?RemoveHead@CLockedDoubleList@@QAEQAVCListEntry@@XZ
?Size@CLKRLinearHashTable@@QBEKXZ
?GetDefaultSpinCount@CReaderWriterLock2@@SGGXZ
?IsEmpty@CLockedDoubleList@@QBE_NXZ
??4CReaderWriterLock2@@QAEAAV0@ABV0@@Z
?ReadOrWriteUnlock@CFakeLock@@QAEX_N@Z
?IsMillnm@CMdVersionInfo@@SAHXZ
mpRealloc
?WriteUnlock@CReaderWriterLock3@@QAEXXZ
Sections
.text Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ