Static task
static1
Behavioral task
behavioral1
Sample
cc225a2fb0a27d94989cceb2709567301a3656127c17ec1b3e277ac745605dda.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
cc225a2fb0a27d94989cceb2709567301a3656127c17ec1b3e277ac745605dda.exe
Resource
win10v2004-20220901-en
General
-
Target
cc225a2fb0a27d94989cceb2709567301a3656127c17ec1b3e277ac745605dda
-
Size
1.3MB
-
MD5
831a24908b53289d206ae89e387a6ea1
-
SHA1
e0c6697797b96c6e0d2f76370efbf9fcda0fa234
-
SHA256
cc225a2fb0a27d94989cceb2709567301a3656127c17ec1b3e277ac745605dda
-
SHA512
6c4d28c56af40a1ac2ea1f5f480e299e1dd3801b65ea02a6086c3dad2b51ce6f78337af7c168eac2e1fa60dc526993aa83cb09dfd6a53f7f4181325f502f157b
-
SSDEEP
24576:n3qeyNWG6ZB+Gk/wOapajFTmuQCIkNCvPxUO90inxi6/xI//vT:nTJk/wVpBuQR90inxi6/xI//b
Malware Config
Signatures
Files
-
cc225a2fb0a27d94989cceb2709567301a3656127c17ec1b3e277ac745605dda.exe windows x86
71b9385a6bf391e88236f637de9c3a3c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_REMOVABLE_RUN_FROM_SWAP
IMAGE_FILE_NET_RUN_FROM_SWAP
Imports
advapi32
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
RegEnumValueW
CloseServiceHandle
OpenSCManagerW
OpenServiceW
RegCreateKeyExW
QueryServiceStatusEx
RegNotifyChangeKeyValue
OpenProcessToken
DuplicateTokenEx
LookupPrivilegeValueW
AdjustTokenPrivileges
RegSetValueExW
kernel32
EnterCriticalSection
DeleteCriticalSection
CloseHandle
GetWindowsDirectoryW
ExpandEnvironmentStringsW
CreateThread
CreateProcessW
GetExitCodeProcess
GetTickCount64
GetPrivateProfileStringW
GetLocaleInfoEx
MoveFileW
RemoveDirectoryW
DeleteFileW
GetTempFileNameW
FindFirstFileW
FindResourceExW
SetEnvironmentVariableW
CreateDirectoryW
InitializeCriticalSectionAndSpinCount
GetVersionExW
FindClose
FindNextFileW
GetUserDefaultUILanguage
SetEvent
GetTickCount
InitializeCriticalSection
Sleep
FormatMessageW
GetProcAddress
CreateEventW
WaitForMultipleObjects
LocalFree
FreeLibrary
OpenProcess
LoadLibraryW
LoadLibraryExW
MoveFileExW
CopyFileW
GetTempPathW
SetProcessShutdownParameters
SetFileAttributesW
EnumResourceNamesW
LCIDToLocaleName
LoadResource
WriteFile
GetLocaleInfoW
SizeofResource
CreateFileW
LockResource
EnumResourceLanguagesW
MulDiv
InterlockedDecrement
GetModuleFileNameW
GetSystemDefaultLangID
GetUserDefaultLangID
GlobalMemoryStatusEx
GetSystemInfo
EnumUILanguagesW
GetCurrentDirectoryW
GetLastError
GetExitCodeThread
GetPrivateProfileIntW
GetCommandLineW
GetEnvironmentVariableW
RaiseException
InterlockedExchange
lstrcmpiA
WideCharToMultiByte
InterlockedCompareExchange
GetStartupInfoA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleHandleA
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
LocalAlloc
MapViewOfFile
IsWow64Process
CreateFileMappingW
ResumeThread
TerminateProcess
LeaveCriticalSection
GetModuleHandleW
OutputDebugStringW
WaitForSingleObject
GetCurrentProcess
FindResourceW
CreateMutexW
SetFilePointer
FlushFileBuffers
SetLastError
GetLocalTime
gdi32
GetDeviceCaps
GetObjectW
SetTextColor
CreateFontIndirectW
user32
UnregisterClassA
GetDC
ReleaseDC
ExitWindowsEx
GetWindowRect
SetForegroundWindow
OffsetRect
BringWindowToTop
SystemParametersInfoW
GetDesktopWindow
SetWindowPos
CopyRect
GetWindowThreadProcessId
DestroyWindow
CharToOemW
SetTimer
GetMessageW
PostQuitMessage
LoadImageW
PostMessageW
KillTimer
TranslateMessage
IsDialogMessageW
LoadIconW
GetDlgItem
EndDialog
ShowWindow
GetSysColorBrush
CreateDialogParamW
SetDlgItemTextW
SendMessageW
UpdateWindow
GetDlgCtrlID
DispatchMessageW
CharNextW
FindWindowW
LoadStringW
SendDlgItemMessageW
msvcrt
?terminate@@YAXXZ
_except_handler4_common
_controlfp
_onexit
_CxxThrowException
iswalpha
swprintf_s
??1type_info@@UAE@XZ
__dllonexit
_unlock
_lock
_acmdln
_initterm
__setusermatherr
_ismbblead
__p__fmode
_cexit
_exit
exit
__set_app_type
__getmainargs
_amsg_exit
__p__commode
_XcptFilter
memset
free
_itow_s
swscanf_s
wcschr
??2@YAPAXI@Z
??_V@YAXPAX@Z
??_U@YAPAXI@Z
_wcsicmp
iswdigit
_vsnwprintf
_wcsnicmp
??3@YAXPAX@Z
_wtol
memcpy
comctl32
ord332
ord328
ord386
ord334
ord339
InitCommonControlsEx
ord336
ole32
CLSIDFromString
CoSetProxyBlanket
CoCreateInstance
CoInitializeEx
CoUninitialize
CoTaskMemFree
oleaut32
SysReAllocString
SysAllocStringLen
SysStringByteLen
VariantChangeType
VariantInit
VariantClear
SysStringLen
SysFreeString
SysAllocString
shell32
SHGetFolderPathW
SHCreateDirectoryExW
CommandLineToArgvW
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
shlwapi
StrChrW
PathStripPathW
SHRegSetUSValueW
StrCmpNIW
SHDeleteKeyW
PathIsRelativeW
PathFindExtensionW
ord158
PathIsFileSpecW
PathFindFileNameW
ord388
PathRemoveExtensionW
SHRegGetUSValueW
SHGetValueW
PathRemoveFileSpecW
PathIsDirectoryW
PathFileExistsW
uxtheme
IsThemeActive
crypt32
CertVerifyCertificateChainPolicy
wintrust
WTHelperGetProvSignerFromChain
WTHelperProvDataFromStateData
WinVerifyTrust
Sections
.text Size: 106KB - Virtual size: 105KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 691KB - Virtual size: 690KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.vmp0 Size: 500KB - Virtual size: 1.6MB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE