Static task
static1
Behavioral task
behavioral1
Sample
cc44a4006b4a520b1d9e764faba698e6b2b72ef8b07e530cef4916b9b479f85b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cc44a4006b4a520b1d9e764faba698e6b2b72ef8b07e530cef4916b9b479f85b.exe
Resource
win10v2004-20220812-en
General
-
Target
cc44a4006b4a520b1d9e764faba698e6b2b72ef8b07e530cef4916b9b479f85b
-
Size
415KB
-
MD5
78a0753afc0289825cbf53720194e7c9
-
SHA1
5c120445304724e101b8eb6cd02fba0110818410
-
SHA256
cc44a4006b4a520b1d9e764faba698e6b2b72ef8b07e530cef4916b9b479f85b
-
SHA512
e3f5b093a7000ecd20ca4f2d50021cebe8949fb759a1a1ed3bcc0aae9b164ae76f6af2e76105b94c0c6230e8f3a68c755644d1d542e3cd51d79ff643f84b6ba2
-
SSDEEP
6144:NJyX8MI3hXR9P4MGddka/5tpi09w3kQ4o6KPkInQFODY4Tyxh/Amm3:NJMIJRtCHvy0Q4XikInQcaxho
Malware Config
Signatures
Files
-
cc44a4006b4a520b1d9e764faba698e6b2b72ef8b07e530cef4916b9b479f85b.exe windows x86
4557b502e756a3acfc77d7bd38f2078e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetLastError
GetCurrentDirectoryA
CloseHandle
GetCurrentProcess
CreateFileW
BackupRead
BackupSeek
SetFileTime
MoveFileA
FlushFileBuffers
SetFilePointer
SetEndOfFile
GetFileTime
GetFileType
CreateFileA
ReadFile
WriteFile
GetDriveTypeA
GetDiskFreeSpaceA
GetProcAddress
GetModuleHandleA
GetFileAttributesA
GetFileAttributesW
SetFileAttributesA
SetFileAttributesW
GetFullPathNameA
GetFullPathNameW
MoveFileW
DeleteFileA
DeleteFileW
RemoveDirectoryA
RemoveDirectoryW
DeviceIoControl
CreateDirectoryA
CreateDirectoryW
ExpandEnvironmentStringsW
ExpandEnvironmentStringsA
FindClose
FindNextFileA
FindFirstFileA
GetLastError
FindFirstFileW
GetVersionExA
CreateThread
ExitThread
GetProcessAffinityMask
WaitForSingleObject
SetEvent
ResetEvent
WaitForMultipleObjects
CreateEventA
GetModuleFileNameA
SetErrorMode
FreeLibrary
LoadLibraryA
LoadLibraryExA
CompareStringA
SetThreadPriority
GetCurrentThread
SetPriorityClass
SetCurrentDirectoryA
LocalFileTimeToFileTime
FileTimeToSystemTime
FileTimeToLocalFileTime
WideCharToMultiByte
MultiByteToWideChar
CompareStringW
IsDBCSLeadByte
GetCPInfo
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
SetEnvironmentVariableA
GetLocaleInfoA
FormatMessageA
LocalFree
SetConsoleCtrlHandler
Sleep
GetTickCount
GetSystemTime
SystemTimeToFileTime
GetStdHandle
GetConsoleMode
SetConsoleMode
FindNextFileW
ReadConsoleA
GetStringTypeW
GetStringTypeA
GetConsoleCP
HeapFree
HeapReAlloc
HeapAlloc
RtlUnwind
GetModuleHandleW
ExitProcess
GetSystemTimeAsFileTime
GetCommandLineA
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
RaiseException
GetACP
GetOEMCP
IsValidCodePage
HeapSize
GetVersion
InitializeCriticalSectionAndSpinCount
LCMapStringA
LCMapStringW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStartupInfoA
QueryPerformanceCounter
GetCurrentProcessId
user32
CharUpperW
CharLowerW
ExitWindowsEx
CharLowerA
LoadStringA
CharUpperA
CharToOemBuffA
OemToCharA
OemToCharBuffA
CharToOemA
advapi32
RegQueryValueExA
RegCloseKey
GetFileSecurityW
GetFileSecurityA
GetSecurityDescriptorLength
SetFileSecurityW
SetFileSecurityA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyExA
shell32
SHGetMalloc
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHFileOperationA
Sections
.text Size: 296KB - Virtual size: 296KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 58KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE