Static task
static1
Behavioral task
behavioral1
Sample
cc6d7364e129373dd8a59d32b6d76be1d94510a385e01c9b0592f4ee07d28003.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
cc6d7364e129373dd8a59d32b6d76be1d94510a385e01c9b0592f4ee07d28003.exe
Resource
win10v2004-20220901-en
General
-
Target
cc6d7364e129373dd8a59d32b6d76be1d94510a385e01c9b0592f4ee07d28003
-
Size
1.2MB
-
MD5
81a969d8deda5b1381ca2d25a0ae0b36
-
SHA1
7df7f529a41e414e5321e0a6c6ee965c107310d1
-
SHA256
cc6d7364e129373dd8a59d32b6d76be1d94510a385e01c9b0592f4ee07d28003
-
SHA512
dfc61b6789b64000f94f8554e861745791a3534d44745bec98c9ef9687a1c3605fb231d440022a25cf16326577019912a3da36a0068eeeb22e60da3c65568c57
-
SSDEEP
24576:Oi16tydol/8IcOwgZGsMlDD0avWsYE1m7qVZiS7y2qZATyzmni:t1GlOaE1g6R7yQ+mni
Malware Config
Signatures
Files
-
cc6d7364e129373dd8a59d32b6d76be1d94510a385e01c9b0592f4ee07d28003.exe windows x86
7b8a092ca3d45c37529bdca8b27e61a6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
iphlpapi
GetAdaptersInfo
kernel32
SuspendThread
CreateEventA
GlobalFlags
LocalAlloc
LeaveCriticalSection
TlsGetValue
EnterCriticalSection
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
GetCPInfo
GetOEMCP
GetFileAttributesA
GetFileTime
SetErrorMode
GetCurrentDirectoryA
GetTickCount
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
HeapAlloc
VirtualProtect
VirtualAlloc
SetEvent
HeapReAlloc
GetCommandLineA
GetProcessHeap
GetStartupInfoA
GetDriveTypeA
GetTimeFormatA
GetDateFormatA
GetFileType
GetTimeZoneInformation
RtlUnwind
RaiseException
ExitThread
HeapSize
GetACP
LCMapStringA
LCMapStringW
HeapDestroy
HeapCreate
VirtualFree
GetStdHandle
GetStringTypeA
GetStringTypeW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
SetThreadPriority
GetPrivateProfileStringA
WritePrivateProfileStringA
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileA
CreateFileA
GetFullPathNameA
GetVolumeInformationA
GetThreadLocale
GetFileSize
GetModuleFileNameW
GetCurrentProcessId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpW
GetModuleHandleA
SetLastError
GlobalAlloc
FormatMessageA
LocalFree
MulDiv
GlobalLock
GlobalUnlock
GlobalFree
LockFile
LockFileEx
UnlockFile
FindFirstFileW
FindNextFileW
Sleep
GetSystemTime
CreateFileMappingW
OpenFileMappingW
MapViewOfFile
UnmapViewOfFile
GetVersionExW
GetTempPathW
FlushFileBuffers
WriteFile
ReadFile
DuplicateHandle
SetFilePointer
SetEndOfFile
GetFileInformationByHandle
GetFileAttributesW
MoveFileW
MoveFileExW
DeleteFileW
GetCurrentThreadId
GetDiskFreeSpaceW
CreateFileW
PulseEvent
InterlockedIncrement
InterlockedDecrement
CreateEventW
GetVersion
CompareStringA
InterlockedExchange
MultiByteToWideChar
CompareStringW
CreateProcessA
CloseHandle
GetLastError
CreateMutexA
GetModuleFileNameA
FindClose
FindFirstFileA
CopyFileA
DeleteFileA
lstrcmpA
FreeResource
ExitProcess
WinExec
lstrlenA
lstrcatA
lstrcpyA
GetWindowsDirectoryA
FreeLibrary
GetCurrentProcess
GetProcAddress
LoadLibraryA
lstrcmpiA
GetVersionExA
WaitForSingleObject
ResumeThread
SetThreadAffinityMask
CreateThread
GetSystemInfo
QueryPerformanceFrequency
QueryPerformanceCounter
FindResourceA
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
VirtualQuery
user32
CharNextA
CopyAcceleratorTableA
SetRect
InvalidateRgn
GetNextDlgGroupItem
RegisterClipboardFormatA
PostThreadMessageA
DestroyMenu
GetCursorPos
WindowFromPoint
EndPaint
BeginPaint
GetWindowDC
GrayStringA
DrawTextExA
TabbedTextOutA
GetWindowThreadProcessId
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
RegisterWindowMessageA
WinHelpA
IsChild
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
PeekMessageA
MapWindowPoints
TrackPopupMenu
GetKeyState
UnregisterClassA
UpdateWindow
GetMenu
PostMessageA
MessageBoxA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
EqualRect
CallWindowProcA
OffsetRect
SystemParametersInfoA
GetWindowPlacement
GetMenuState
GetMenuItemID
GetWindowTextLengthA
GetWindowTextA
SetWindowPos
SetFocus
MoveWindow
GetDlgCtrlID
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
SendDlgItemMessageA
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetDlgItem
IsWindowEnabled
GetNextDlgTabItem
EndDialog
CharUpperA
DrawTextA
FrameRect
CopyRect
TranslateAcceleratorA
RemovePropA
DrawIcon
GetSystemMetrics
SetPropA
AppendMenuA
GetSystemMenu
SetForegroundWindow
IsIconic
GetPropA
GetDesktopWindow
GetWindow
ScreenToClient
IsRectEmpty
GetSysColorBrush
GetMessageA
GetMessagePos
ClientToScreen
TranslateMessage
ValidateRect
SetWindowContextHelpId
MapDialogRect
IsWindowVisible
PostQuitMessage
RemoveMenu
GetMenuItemCount
GetSubMenu
LoadMenuA
FillRect
GetWindowLongA
IntersectRect
DefWindowProcA
LoadAcceleratorsA
LoadIconA
ShowWindow
CopyIcon
LoadCursorA
InflateRect
ReleaseDC
GetDC
GetWindowRect
InvalidateRect
IsWindow
SetWindowLongA
SetCursor
SetCapture
RedrawWindow
ReleaseCapture
PtInRect
MessageBeep
GetSysColor
GetParent
SendMessageA
GetClientRect
EnableWindow
GetFocus
gdi32
ScaleWindowExtEx
ExtSelectClipRgn
DeleteDC
CreateSolidBrush
SetWindowExtEx
GetMapMode
DPtoLP
GetRgnBox
SelectClipRgn
DeleteObject
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
GetViewportExtEx
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetObjectA
GetStockObject
ExcludeClipRect
SetMapMode
SetBkMode
RestoreDC
SaveDC
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
GetDeviceCaps
GetTextColor
GetBkColor
CreateRectRgnIndirect
GetTextExtentPoint32A
CreateFontIndirectA
GetWindowExtEx
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegDeleteValueA
RegCreateKeyExA
RegOpenKeyExA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegSetValueExA
RegQueryValueA
RegCloseKey
RegQueryValueExA
shell32
SHBrowseForFolderA
SHGetPathFromIDListA
ShellExecuteA
comctl32
InitCommonControlsEx
shlwapi
PathIsUNCA
PathFindExtensionA
PathStripToRootA
PathFindFileNameA
oledlg
ord8
ole32
OleIsCurrentClipboard
CoRevokeClassObject
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
OleFlushClipboard
CLSIDFromString
CLSIDFromProgID
CoTaskMemAlloc
CoTaskMemFree
CoRegisterMessageFilter
oleaut32
SysAllocStringLen
VariantInit
VariantChangeType
VariantClear
SysAllocStringByteLen
SysFreeString
SysStringLen
OleLoadPicture
SysAllocString
OleCreateFontIndirect
SystemTimeToVariantTime
VariantTimeToSystemTime
SafeArrayDestroy
VariantCopy
ws2_32
htons
gethostbyname
WSACleanup
socket
connect
closesocket
send
WSAStartup
Sections
.text Size: 888KB - Virtual size: 885KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 144KB - Virtual size: 141KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 176KB - Virtual size: 172KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ