Static task
static1
Behavioral task
behavioral1
Sample
cca58109c71f6e1d29082acf9cd194e1010cbf307733385e639854d42439ace6.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
cca58109c71f6e1d29082acf9cd194e1010cbf307733385e639854d42439ace6.exe
Resource
win10v2004-20220812-en
General
-
Target
cca58109c71f6e1d29082acf9cd194e1010cbf307733385e639854d42439ace6
-
Size
364KB
-
MD5
1cf29fb94c686170f1431de4698508d4
-
SHA1
8de6ea9b63ed4075f4888a7577b54b855a0e98fd
-
SHA256
cca58109c71f6e1d29082acf9cd194e1010cbf307733385e639854d42439ace6
-
SHA512
b1bf3e711539e79bb66e92d0c42f60218ab9d161147aee0d04a54d30f79a4400f7fc363dde66e12dc30a52b8b7e46e7d262baa113d228ca79c9ed376463acceb
-
SSDEEP
6144:PPjxSUANPSZTgOelAibsF8elPzAF7G/yJeAAIrl+jaM3LBeS6G/k9gsj:P7xwPSZulvbsqedzAF75JeAAIrl+j73y
Malware Config
Signatures
Files
-
cca58109c71f6e1d29082acf9cd194e1010cbf307733385e639854d42439ace6.exe windows x86
e963a75d6c9e5acd0c8a7ad7b97d4bf6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
DeleteUrlCacheEntry
FindNextUrlCacheEntryA
FindFirstUrlCacheEntryA
InternetSetFilePointer
InternetSetStatusCallback
InternetGetLastResponseInfoA
HttpQueryInfoA
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
InternetSetOptionExA
InternetCloseHandle
InternetWriteFile
InternetOpenA
InternetCanonicalizeUrlA
InternetCrackUrlA
InternetReadFile
InternetQueryDataAvailable
kernel32
GlobalFlags
GetCurrentDirectoryA
GetProcessVersion
GetCPInfo
GetOEMCP
LocalFileTimeToFileTime
SystemTimeToFileTime
SetErrorMode
SizeofResource
RtlUnwind
RaiseException
GetStartupInfoA
GetCommandLineA
ExitProcess
TerminateProcess
HeapFree
CreateThread
ExitThread
HeapAlloc
GetTimeZoneInformation
GetACP
HeapReAlloc
HeapSize
SetStdHandle
GetFileType
TlsGetValue
LCMapStringA
LCMapStringW
SetUnhandledExceptionFilter
SetHandleCount
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
LocalReAlloc
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
TlsAlloc
FileTimeToLocalFileTime
FileTimeToSystemTime
GetShortPathNameA
GetThreadLocale
GetStringTypeExA
GetVolumeInformationA
MoveFileA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
ReadFile
GetCurrentProcess
DuplicateHandle
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
LocalAlloc
EnterCriticalSection
FormatMessageA
LocalFree
GlobalUnlock
MulDiv
lstrlenW
GetLastError
GetDiskFreeSpaceA
SetFileTime
GetFullPathNameA
GetProfileIntA
SearchPathA
lstrcpynA
GetTempPathA
GetTempFileNameA
GetProfileStringA
SetLastError
GlobalFree
WritePrivateProfileStringA
GetPrivateProfileStringA
GetVersion
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
MultiByteToWideChar
lstrlenA
InterlockedDecrement
InterlockedIncrement
CreateEventA
SuspendThread
SetThreadPriority
ResumeThread
SetEvent
WaitForSingleObject
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
FreeLibrary
WideCharToMultiByte
GetFileAttributesA
DeleteFileA
GetFileSize
SetFilePointer
GetTickCount
GetVersionExA
FindResourceA
LoadResource
LockResource
GetModuleHandleA
GetModuleFileNameA
GetCurrentProcessId
Sleep
OutputDebugStringA
LoadLibraryA
GetSystemDirectoryA
GetProcAddress
WriteFile
lstrcpyA
lstrcatA
FindFirstFileA
CreateFileA
GetFileTime
CloseHandle
CompareFileTime
FindNextFileA
FindClose
lstrcmpA
GetPrivateProfileIntA
user32
GetMenuStringA
GetDC
ReleaseDC
GetWindowDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
LoadCursorA
GetSysColorBrush
DestroyIcon
CharNextA
CopyAcceleratorTableA
SetRect
GetNextDlgGroupItem
MessageBeep
CreateDialogIndirectParamA
EndDialog
WindowFromPoint
InflateRect
RegisterClipboardFormatA
GetDCEx
LockWindowUpdate
PostThreadMessageA
SetParent
DrawMenuBar
TranslateMDISysAccel
DefFrameProcA
BringWindowToTop
UnpackDDElParam
ReuseDDElParam
SetMenu
GetDesktopWindow
TranslateAcceleratorA
SetRectEmpty
FindWindowA
InvalidateRect
RemoveMenu
SetCapture
ReleaseCapture
SetTimer
KillTimer
MapDialogRect
SetWindowContextHelpId
DestroyMenu
LoadMenuA
LoadAcceleratorsA
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
DeleteMenu
LoadIconA
SendDlgItemMessageA
MapWindowPoints
GetSysColor
SetActiveWindow
IsWindow
SetFocus
AdjustWindowRectEx
ScreenToClient
EqualRect
DeferWindowPos
GetClientRect
BeginDeferWindowPos
CopyRect
EndDeferWindowPos
ScrollWindow
SetScrollInfo
ShowScrollBar
RedrawWindow
SetScrollRange
GetScrollPos
SetScrollPos
GetTopWindow
IsChild
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetDlgItem
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
DefWindowProcA
DestroyWindow
CreateWindowExA
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
UnregisterClassA
HideCaret
ShowCaret
ExcludeUpdateRgn
DrawFocusRect
DefDlgProcA
IsWindowUnicode
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
OffsetRect
IntersectRect
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetSystemMetrics
InsertMenuA
ClientToScreen
PtInRect
LoadStringA
IsZoomed
CharUpperA
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
MessageBoxA
SetCursor
ShowOwnedPopups
PostQuitMessage
GetParent
SendMessageA
OpenDesktopA
CreateDesktopA
EnumWindows
EnumDesktopWindows
GetClassNameA
GetWindowThreadProcessId
GetScrollRange
DefMDIChildProcA
EnumChildWindows
wsprintfA
EnableWindow
UpdateWindow
PostMessageA
GetScrollInfo
gdi32
GetDeviceCaps
GetViewportExtEx
GetWindowExtEx
CreateSolidBrush
CreatePatternBrush
PtVisible
RectVisible
TextOutA
ExtTextOutA
GetTextColor
GetBkColor
GetMapMode
PatBlt
SetRectRgn
CombineRgn
CreateRectRgnIndirect
CreateFontIndirectA
BitBlt
CreateCompatibleDC
GetTextExtentPointA
CreateRectRgn
CreateDIBitmap
GetClipBox
Escape
CreateBitmap
IntersectClipRect
ExcludeClipRect
SelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetBkMode
GetStockObject
RestoreDC
SaveDC
DeleteDC
DeleteObject
GetTextMetricsA
SelectObject
GetTextExtentPoint32A
DPtoLP
LPtoDP
GetObjectA
SetBkColor
SetTextColor
comdlg32
GetFileTitleA
GetOpenFileNameA
GetSaveFileNameA
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
advapi32
RegQueryValueExA
RegSetValueA
RegCreateKeyA
GetFileSecurityA
SetFileSecurityA
RegDeleteValueA
RegSetValueExA
RegQueryValueA
RegOpenKeyExA
RegCreateKeyExA
RegDeleteKeyA
RegOpenKeyA
RegCloseKey
shell32
SHGetFileInfoA
DragQueryFileA
DragFinish
SHGetSpecialFolderPathA
ExtractIconA
comctl32
ord17
oledlg
ord8
ole32
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CoTaskMemFree
CoTaskMemAlloc
OleInitialize
OleUninitialize
CoFreeUnusedLibraries
CoGetClassObject
CoRegisterMessageFilter
CoRevokeClassObject
CLSIDFromString
CLSIDFromProgID
OleFlushClipboard
OleIsCurrentClipboard
olepro32
ord253
oleaut32
VariantCopy
SysStringLen
SysAllocStringByteLen
SafeArrayCreate
SafeArrayGetDim
SafeArrayGetElemsize
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
VariantTimeToSystemTime
VariantChangeType
VariantInit
SysFreeString
SysAllocString
SysAllocStringLen
VariantClear
wsock32
WSAStartup
WSACleanup
Sections
.text Size: 260KB - Virtual size: 259KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 64KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ