Static task
static1
Behavioral task
behavioral1
Sample
ccfa431471b158b9cf0fbdac6d6c946ed7fff1dd9bca37ab404fedd95136da4a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ccfa431471b158b9cf0fbdac6d6c946ed7fff1dd9bca37ab404fedd95136da4a.exe
Resource
win10v2004-20220812-en
General
-
Target
ccfa431471b158b9cf0fbdac6d6c946ed7fff1dd9bca37ab404fedd95136da4a
-
Size
300KB
-
MD5
601576483dd240e9e4d1b8097c6dbfd9
-
SHA1
cb192f664a9ae74793b3baadce180dbf900c42dc
-
SHA256
ccfa431471b158b9cf0fbdac6d6c946ed7fff1dd9bca37ab404fedd95136da4a
-
SHA512
2f92ac7df03c6a875b3c05ae066e0531b9042bb7f4f842bd17e31cd6e1f52c8d34a301c0629e2632f86e2f6f043ac76c00d10582122890a7d429bab9c4f85959
-
SSDEEP
6144:cDKxdcbBWY5U7aOeT8JWeFpzdm3iciVzXpaj4HNI3CWXaTIZHis8W:yKxdcbBhm7QVswyNVaeNIBqe8
Malware Config
Signatures
Files
-
ccfa431471b158b9cf0fbdac6d6c946ed7fff1dd9bca37ab404fedd95136da4a.exe windows x86
245a8c9d038e8c84d3133f29fdcd58db
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetLastError
CreateNamedPipeW
GetCommState
FileTimeToLocalFileTime
GetModuleHandleA
CreateMailslotW
GetVolumePathNameW
GetModuleFileNameA
GetLogicalDriveStringsW
lstrlenA
GetProcessHeap
lstrcmpiW
GetStdHandle
lstrcmpiW
lstrcmpiW
lstrcmpiW
IsValidLocale
lstrcmpiW
GetConsoleAliasW
Sleep
DeleteFileA
GetStartupInfoA
HeapCreate
sqlunirl
wsprintf_
_AppendMenu_@16
AbortSystemShutdown_
_CallMsgFilter_@8
Sections
.text Size: 3KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.RDATA Size: 1024B - Virtual size: 776B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ORPC Size: 294KB - Virtual size: 293KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.PDATA Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ