Static task
static1
Behavioral task
behavioral1
Sample
2ccb8b6be97de72fe1da19180728f7cd50069facb6d5032963231f65cc8946c5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2ccb8b6be97de72fe1da19180728f7cd50069facb6d5032963231f65cc8946c5.exe
Resource
win10v2004-20220901-en
General
-
Target
2ccb8b6be97de72fe1da19180728f7cd50069facb6d5032963231f65cc8946c5
-
Size
672KB
-
MD5
51846596e894f05364144a85a0459227
-
SHA1
6e172bc4f6cac065cd3b7fa57eeaa58f99f72a7d
-
SHA256
2ccb8b6be97de72fe1da19180728f7cd50069facb6d5032963231f65cc8946c5
-
SHA512
f6cb967452ba744dc641a2224934c5e58faeaab33c4e46c29c59fe4ec2775c5a699ae394cc458d6c44cab655842ce1f8ac32da6f5139df8fe9351cc2f4eed589
-
SSDEEP
12288:hEUdKlXHHsGEytzPa4ehsctZ+PzDc372Y+3UgQlM06X5181XW85zr:hEJXnn7tzCh+PzK+3xQlMzJ181Dzr
Malware Config
Signatures
Files
-
2ccb8b6be97de72fe1da19180728f7cd50069facb6d5032963231f65cc8946c5.exe windows x86
afb23f84a4675c67f5f4c7ce172df455
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
CoCreateInstance
CoRevokeClassObject
CreateDataAdviseHolder
CoTaskMemAlloc
CLSIDFromProgID
CreateStreamOnHGlobal
CoFreeUnusedLibraries
CoTaskMemFree
StgOpenStorageOnILockBytes
OleUninitialize
OleInitialize
CoLockObjectExternal
CoGetClassObject
CreateOleAdviseHolder
RevokeDragDrop
WriteClassStm
OleDuplicateData
CoGetMalloc
gdi32
PlayMetaFile
CreateCompatibleBitmap
BeginPath
GetWindowExtEx
Rectangle
GetPolyFillMode
Polyline
CreatePen
SelectClipRgn
RoundRect
PolylineTo
CreatePalette
GetRgnBox
CreateBrushIndirect
SetPixel
ExtTextOutA
SetArcDirection
CreateRectRgn
SetMapMode
StrokePath
RealizePalette
CreateHalftonePalette
StretchDIBits
CreatePenIndirect
GetBitmapBits
GetTextFaceA
RectVisible
DPtoLP
OffsetRgn
CopyMetaFileA
SetTextCharacterExtra
EqualRgn
Escape
GetTextExtentPoint32A
GetStockObject
SetPaletteEntries
OffsetViewportOrgEx
ExcludeClipRect
StrokeAndFillPath
CreateSolidBrush
ExtCreatePen
Ellipse
FlattenPath
StartDocA
SetWindowOrgEx
GetGlyphOutlineA
PtInRegion
GetBkMode
SetBoundsRect
SelectObject
GetTextMetricsA
SetTextColor
OffsetClipRgn
ScaleWindowExtEx
GetObjectType
GetBoundsRect
SaveDC
GetTextColor
GetMapMode
PlayEnhMetaFile
SetTextJustification
CreateMetaFileA
CloseMetaFile
CreateHatchBrush
FillPath
GetPath
DeleteObject
CreateFontIndirectA
CreateBitmap
SetStretchBltMode
ResetDCA
CreateFontA
SetPixelV
SetRectRgn
CreateDIBitmap
GetDCOrgEx
DeleteMetaFile
BitBlt
CreateRoundRectRgn
UpdateColors
ExtFloodFill
EndPath
SetViewportExtEx
SetAbortProc
AbortDoc
TextOutA
CreateRectRgnIndirect
Polygon
SelectPalette
CreateDCA
ScaleViewportExtEx
PolyPolyline
DeleteDC
RestoreDC
GetStretchBltMode
GetDeviceCaps
GetCharWidthA
GetROP2
shell32
SHGetMalloc
DragFinish
SHGetPathFromIDListW
SHGetSpecialFolderPathW
Shell_NotifyIconW
SHFileOperationW
DragQueryFileW
user32
EndDialog
MapWindowPoints
SetTimer
GetTopWindow
DestroyMenu
EnableMenuItem
ClientToScreen
TranslateAcceleratorW
GetClientRect
BeginPaint
LoadAcceleratorsW
GetWindowRect
KillTimer
CreateWindowExW
EndDeferWindowPos
LoadIconW
SetCursorPos
PostMessageW
GetMessageW
RegisterClassExW
GetMenuItemCount
IsIconic
SetFocus
EndPaint
GetScrollInfo
OffsetRect
LoadImageW
GetWindowLongW
TranslateMessage
GetMenu
SetMenuItemBitmaps
PtInRect
SetForegroundWindow
SetParent
GetSysColor
ShowWindow
DeferWindowPos
SetWindowRgn
GetClassInfoW
SubtractRect
MessageBoxW
InvalidateRect
GetWindowThreadProcessId
GetWindowPlacement
DestroyWindow
PeekMessageW
IsWindowVisible
SetScrollInfo
CallNextHookEx
GetDesktopWindow
SetCapture
DestroyAcceleratorTable
IsWindow
UnpackDDElParam
GetDC
SetMenuDefaultItem
LoadBitmapW
LoadMenuW
IsRectEmpty
GetCapture
CreatePopupMenu
BeginDeferWindowPos
DefWindowProcW
RedrawWindow
ChildWindowFromPointEx
LoadCursorW
GetSystemMetrics
RegisterClassW
DrawFrameControl
UpdateWindow
GetWindowRgn
SetRect
comctl32
ImageList_DragEnter
ord17
kernel32
LocalAlloc
lstrlenA
ExitProcess
GetCurrentThread
CreateFileW
HeapDestroy
InterlockedDecrement
CreateFileA
HeapFree
Sleep
GetFileSize
GetCPInfo
GetLocaleInfoW
GetFileType
GlobalMemoryStatus
GetSystemDirectoryA
FileTimeToSystemTime
SetUnhandledExceptionFilter
UnmapViewOfFile
FindNextFileW
InterlockedExchange
HeapCreate
VirtualQuery
CreateThread
GetModuleFileNameW
LeaveCriticalSection
LoadResource
IsBadCodePtr
WideCharToMultiByte
ExpandEnvironmentStringsA
LoadLibraryW
CreateToolhelp32Snapshot
SizeofResource
CloseHandle
CreateMutexW
GetCommandLineW
lstrcmpW
LocalFree
lstrcmpA
GetCurrentThreadId
SetEndOfFile
CompareStringW
lstrlenW
FormatMessageA
MoveFileW
FreeEnvironmentStringsW
RaiseException
GetLocaleInfoA
GetStartupInfoA
VirtualAlloc
LCMapStringA
lstrcpyW
GetTimeZoneInformation
UnhandledExceptionFilter
GetFullPathNameW
DeleteCriticalSection
QueryPerformanceCounter
DuplicateHandle
CompareStringA
RtlUnwind
GlobalDeleteAtom
GetModuleHandleW
lstrcpyA
SetFilePointer
TlsGetValue
GetVersion
GetModuleHandleA
GetCommandLineA
SetStdHandle
SetEvent
FreeEnvironmentStringsA
TlsAlloc
GlobalHandle
GetLocalTime
GetLastError
ReadFile
GetCurrentProcess
GetDateFormatA
GetProcAddress
GlobalAlloc
GetStringTypeA
CreateDirectoryW
GetStringTypeW
GetModuleFileNameA
SetThreadPriority
GetVersionExA
VirtualFree
GetSystemInfo
GetOEMCP
CreateProcessA
OpenProcess
GetStdHandle
TlsFree
CreateFileMappingW
InitializeCriticalSection
MultiByteToWideChar
GlobalLock
LoadLibraryA
GlobalUnlock
GetEnvironmentStringsW
VirtualProtect
RemoveDirectoryW
SetLastError
LockResource
InterlockedIncrement
LCMapStringW
ResetEvent
GetFileAttributesW
TerminateProcess
GetSystemTime
HeapAlloc
HeapReAlloc
SetEnvironmentVariableA
FindClose
GetCurrentProcessId
TlsSetValue
GetStartupInfoW
EnterCriticalSection
WriteFile
GetEnvironmentStrings
CreateMutexA
FlushFileBuffers
GetTempFileNameW
GetSystemTimeAsFileTime
GetTempPathA
FreeResource
SetHandleCount
GetACP
GetTickCount
Sections
.text Size: 72KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 472KB - Virtual size: 469KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 104KB - Virtual size: 119KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ