Static task
static1
Behavioral task
behavioral1
Sample
cc6ed7d288f8761802095a499dd9bea641bb4fbb6f6d31e70c1fc7834f203d8b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cc6ed7d288f8761802095a499dd9bea641bb4fbb6f6d31e70c1fc7834f203d8b.exe
Resource
win10v2004-20220812-en
General
-
Target
cc6ed7d288f8761802095a499dd9bea641bb4fbb6f6d31e70c1fc7834f203d8b
-
Size
341KB
-
MD5
91f2a8ab9518b676c1dc47a70b4a3ba0
-
SHA1
9ba9843be335bc44591b3542341001f37ac31363
-
SHA256
cc6ed7d288f8761802095a499dd9bea641bb4fbb6f6d31e70c1fc7834f203d8b
-
SHA512
f772b3e5d488da4f88b3d537f718f707a4461bd2c2b1c38daac00a282515cee980269c6bf5afc4e5da1c8521a793bf109c03fb9893caa57ab9e2f952a37f60d5
-
SSDEEP
6144:0AyXGqt2gl6bIBMox2ezQBliM8rYWM7UdWTfjOTkeJat3Z:tDqt2gl6WhnzQWMivWTrEHkb
Malware Config
Signatures
Files
-
cc6ed7d288f8761802095a499dd9bea641bb4fbb6f6d31e70c1fc7834f203d8b.exe windows x86
1a17dbe3e9366ff47778eb570d6f1794
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ResetEvent
CreateFileA
WritePrivateProfileStringA
GetTickCount
GetTempPathA
WriteFile
SetFilePointer
FreeLibrary
TerminateThread
OutputDebugStringA
GetCurrentProcess
SetFileAttributesA
GetModuleFileNameA
DeleteFileA
CreateProcessA
GetProcAddress
CloseHandle
GetPrivateProfileStringA
GetVersionExA
GetSystemDefaultUILanguage
ReleaseMutex
OpenEventA
SetErrorMode
GetLastError
CreateMutexA
SetUnhandledExceptionFilter
SetThreadPriority
CreateThread
GetCurrentProcessId
FlushFileBuffers
Sleep
CancelIo
InterlockedExchange
SetEvent
WaitForSingleObject
lstrcpyA
CreateEventA
EnterCriticalSection
LeaveCriticalSection
VirtualAlloc
VirtualFree
DeleteCriticalSection
LoadLibraryA
InitializeCriticalSection
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetLocaleInfoA
MultiByteToWideChar
GetConsoleMode
GetConsoleCP
HeapSize
GetOEMCP
GetACP
GetCPInfo
GetSystemTimeAsFileTime
RtlUnwind
RaiseException
GetModuleHandleA
ExitProcess
ExitThread
GetCurrentThreadId
HeapFree
HeapAlloc
GetCommandLineA
GetProcessHeap
GetStartupInfoA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
GetStdHandle
HeapDestroy
HeapCreate
HeapReAlloc
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
user32
MessageBoxA
wsprintfA
ExitWindowsEx
advapi32
RegQueryValueExA
RegDeleteKeyA
RegOpenKeyA
RegDeleteValueA
RegSetValueExA
RegCloseKey
OpenSCManagerA
OpenServiceA
DeleteService
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyExA
shell32
ShellExecuteA
ws2_32
inet_addr
htons
connect
WSAIoctl
WSACleanup
inet_ntoa
send
select
recv
closesocket
gethostbyname
ntohs
WSAStartup
sendto
htonl
WSASocketA
gethostname
setsockopt
socket
wininet
InternetReadFile
InternetCloseHandle
Sections
.text Size: 112KB - Virtual size: 111KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.mjg Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE