Static task
static1
Behavioral task
behavioral1
Sample
ccdb0f4de101acc41e01087f50c28a3848e209615728c4c2018ff4144e8926a4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ccdb0f4de101acc41e01087f50c28a3848e209615728c4c2018ff4144e8926a4.exe
Resource
win10v2004-20220812-en
General
-
Target
ccdb0f4de101acc41e01087f50c28a3848e209615728c4c2018ff4144e8926a4
-
Size
15KB
-
MD5
071985a8d9ed773e44622cb416835729
-
SHA1
0b9a441984e745841e64368b8812f22c5f173d17
-
SHA256
ccdb0f4de101acc41e01087f50c28a3848e209615728c4c2018ff4144e8926a4
-
SHA512
392bb48f37ab1087dec003ea52f2ab2f913e2a8960ccaa02ef28c34d06bc5f50c8168665220205a557e8630561c10b43f311e2d8f5887377e0f31b2d7b0fa93d
-
SSDEEP
96:2nYBxbTmBBjkcfrAlhNHc2BywoAJPQYi3K1DntAfdomPdHWsyzUpeXw7b:c+bTQBk4Alh9pBpbtQYQK5YouI1Uj7b
Malware Config
Signatures
Files
-
ccdb0f4de101acc41e01087f50c28a3848e209615728c4c2018ff4144e8926a4.exe windows x86
b093b9b6223af7f9e72d34d8765aa77f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
RegisterServiceCtrlHandlerA
SetServiceStatus
StartServiceCtrlDispatcherA
kernel32
CloseHandle
CreateProcessA
ExitProcess
GetThreadContext
ResumeThread
SetThreadContext
VirtualAllocEx
WriteProcessMemory
msvcrt
memset
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 28B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 48B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1024B - Virtual size: 548B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE