Static task
static1
Behavioral task
behavioral1
Sample
ccf1fbdacc4917ce7e48f9f5446ee202b46f80522d343b30e344e58df765e4d3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ccf1fbdacc4917ce7e48f9f5446ee202b46f80522d343b30e344e58df765e4d3.exe
Resource
win10v2004-20220812-en
General
-
Target
ccf1fbdacc4917ce7e48f9f5446ee202b46f80522d343b30e344e58df765e4d3
-
Size
63KB
-
MD5
4d0d6f70ac12611caee61983438de0f0
-
SHA1
ec7d0e4f2ad837af4c65c76811861a794ce23dfb
-
SHA256
ccf1fbdacc4917ce7e48f9f5446ee202b46f80522d343b30e344e58df765e4d3
-
SHA512
e2e53715b47c61efcfe67d3540070e3d6595647b08634a97b3288d8fcc1a80122c9d1e1d4bf0c41efef780d4c88f1a2aaca387ea8c8dc5cb830dfd7553b52f77
-
SSDEEP
768:GkKupCSER/4o4A/T78QKgbfBKguGT/Dn3aRdMkttm44BrYj8uczpTyqq9u5z:Gk1MSw4y7tKgbzfnK8+I44BrUHc09uh
Malware Config
Signatures
Files
-
ccf1fbdacc4917ce7e48f9f5446ee202b46f80522d343b30e344e58df765e4d3.exe windows x86
bd017a92835807430b6dff7f4d7fe708
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemTimeAsFileTime
VirtualAlloc
CloseHandle
GetProcessHeap
Beep
GlobalAlloc
GetLongPathNameA
lstrcpyA
FindResourceA
OpenEventA
GetDiskFreeSpaceA
CreateEventA
SetComputerNameW
GetThreadLocale
GlobalGetAtomNameW
WaitForSingleObject
CreateNamedPipeA
EnumTimeFormatsA
CreatePipe
GetUserDefaultLCID
RemoveDirectoryW
GetWindowsDirectoryA
lstrcpy
RemoveDirectoryA
OpenEventW
lstrcpynA
DuplicateHandle
GetHandleInformation
SearchPathW
GetSystemTime
SetCurrentDirectoryA
EnumDateFormatsW
GetFullPathNameA
lstrcpyn
GetLogicalDriveStringsW
GetAtomNameA
GetVolumeInformationW
CreateDirectoryW
EnumCalendarInfoW
GetVolumeInformationA
OpenMutexA
CreateDirectoryA
SetLocaleInfoW
BeginUpdateResourceA
MoveFileW
GetCurrentDirectoryW
WinExec
GetDateFormatW
OpenMutexW
GlobalFindAtomA
CopyFileExW
GetTempPathA
GetTempFileNameW
GetCurrentThreadId
GetACP
GetCalendarInfoW
TlsAlloc
GetLogicalDrives
DisconnectNamedPipe
SystemTimeToFileTime
CompareFileTime
FindAtomW
AddAtomW
GetFullPathNameW
lstrcmp
IsDebuggerPresent
FindAtomA
CreateSemaphoreW
lstrcmpW
ExpandEnvironmentStringsW
GetExitCodeThread
FreeLibrary
IsValidCodePage
user32
CreateWindowExW
MessageBeep
UnregisterClassW
CreateMenu
OpenClipboard
GetAsyncKeyState
EnumWindows
InsertMenuA
IsDlgButtonChecked
DialogBoxIndirectParamA
AppendMenuA
FindWindowA
EnableMenuItem
SetForegroundWindow
PeekMessageA
GetActiveWindow
LoadCursorW
GetCapture
RegisterClassW
PostMessageA
CharNextA
CharPrevA
GetKeyboardLayout
SetDlgItemTextA
GetDCEx
LoadMenuA
DialogBoxParamA
GetCaretPos
GetMenuItemCount
GetClassInfoW
SendMessageW
GetIconInfo
SetCursorPos
GetScrollPos
AppendMenuW
MessageBoxW
SetCursor
WaitMessage
GetDlgItemTextA
mouse_event
LoadBitmapA
DestroyIcon
DefWindowProcW
LoadMenuIndirectA
SendDlgItemMessageA
CreateDialogIndirectParamA
GetMenuItemInfoW
GetWindowRgn
CreateDialogParamW
GetKeyState
DestroyCursor
keybd_event
SetWindowPos
WinHelpA
SendDlgItemMessageW
GetMenu
GetMenuStringW
DestroyMenu
DefWindowProcA
SetWindowLongW
LoadImageA
ShowWindow
CreateAcceleratorTableW
Sections
.text Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 38KB - Virtual size: 10.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ