Static task
static1
Behavioral task
behavioral1
Sample
cc34a0f7fbca04aa06785fce28f834369ae58efbede7bdd30f9d6f215df0077b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cc34a0f7fbca04aa06785fce28f834369ae58efbede7bdd30f9d6f215df0077b.exe
Resource
win10v2004-20220812-en
General
-
Target
cc34a0f7fbca04aa06785fce28f834369ae58efbede7bdd30f9d6f215df0077b
-
Size
117KB
-
MD5
ee13f8fa850f7a65705318314708d3b5
-
SHA1
13556c7d30837e71d429a7fc81a017bf35298772
-
SHA256
cc34a0f7fbca04aa06785fce28f834369ae58efbede7bdd30f9d6f215df0077b
-
SHA512
b6b5c4fc1acf8c7a3b5fc3505dbd59780c90dc5575a2abef07185c8699c16649a4a242bd211dafb829d405d4d907c385ac5d5f6c245df65ded321c5cae466d84
-
SSDEEP
1536:/v7bvnlr1CrFDZNDaugcudgvNES0rxxxxxxxOx1vCFKbjN5TpEzTFD:/v7bvjCrFDrocudgaSzCkHN5TpEHV
Malware Config
Signatures
Files
-
cc34a0f7fbca04aa06785fce28f834369ae58efbede7bdd30f9d6f215df0077b.exe windows x86
76eea42da7b3f6f2a1a9125dd658abd3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
StrStrIA
iphlpapi
GetAdaptersInfo
kernel32
VirtualAlloc
GetTickCount
GetProcAddress
LeaveCriticalSection
EnterCriticalSection
DeleteFileA
GetLastError
GetModuleHandleA
ExitProcess
lstrcmpiA
CloseHandle
InitializeCriticalSection
lstrlenA
FindNextFileA
FindFirstFileA
FindClose
VirtualFree
WriteFile
CreateFileA
ReadFile
GetFileSize
CreateDirectoryA
GetFileAttributesA
GetEnvironmentVariableA
lstrcatA
Sleep
SetLastError
user32
wsprintfA
IsCharAlphaNumericA
advapi32
RegOpenKeyExA
RegSetValueExA
RegCloseKey
Sections
.text Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 34KB - Virtual size: 440KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ