Static task
static1
Behavioral task
behavioral1
Sample
cc3d7c241aadbb1abd102bd54e26dd8c487d0863e3fb752a7a44e946d20142ad.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
cc3d7c241aadbb1abd102bd54e26dd8c487d0863e3fb752a7a44e946d20142ad.exe
Resource
win10v2004-20221111-en
General
-
Target
cc3d7c241aadbb1abd102bd54e26dd8c487d0863e3fb752a7a44e946d20142ad
-
Size
280KB
-
MD5
d78a2e8c8aeac70a63c65e07ad6ee368
-
SHA1
e434cc7204eade9dd86db22292eb4fa28a0542dd
-
SHA256
cc3d7c241aadbb1abd102bd54e26dd8c487d0863e3fb752a7a44e946d20142ad
-
SHA512
831866dbd686b57302bdec41305b6300f7fad52c94e7c03f0ec6c8e010bae318ee0a3f1e90a24f1253f976d0f890b1a46308239d23688be8a9f20219c66ba9bd
-
SSDEEP
6144:0kixjxFjYT8PWrg6P5yD1o4WNQqMe5R6zC:0pxjnjYhP5yD1qCqMMR6zC
Malware Config
Signatures
Files
-
cc3d7c241aadbb1abd102bd54e26dd8c487d0863e3fb752a7a44e946d20142ad.exe windows x86
4058e20094db16f176c06110aafa517d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
MapWindowPoints
EnumWindowStationsA
BroadcastSystemMessageW
MapVirtualKeyA
DdeInitializeA
LoadStringW
RegisterClassA
SendMessageW
EndPaint
GetDoubleClickTime
MessageBoxA
TranslateMessage
SetWindowLongA
PeekMessageA
MsgWaitForMultipleObjects
LoadStringA
ExitWindowsEx
DispatchMessageA
DestroyWindow
CreateWindowExA
CallWindowProcA
CharPrevA
advapi32
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
comctl32
ord17
kernel32
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetOEMCP
CompareStringA
CompareStringW
SetEnvironmentVariableA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
TlsGetValue
CreateDirectoryA
CreateProcessA
DeleteFileA
FindResourceA
FormatMessageA
GetACP
GetCurrentProcess
GetEnvironmentVariableA
GetExitCodeProcess
GetFileAttributesA
GetFullPathNameA
GetLocaleInfoA
GetModuleFileNameA
GetProcAddress
GetSystemDefaultLCID
GetSystemInfo
GetUserDefaultLangID
GetVersionExA
GetWindowsDirectoryA
IsDBCSLeadByte
LoadLibraryA
LoadResource
LockResource
RemoveDirectoryA
SetErrorMode
SetLastError
SizeofResource
Sleep
VirtualProtect
VirtualQuery
CloseHandle
CreateFileA
ExitProcess
GetFileType
GetSystemTime
GetFileSize
GetStdHandle
RaiseException
ReadFile
RtlUnwind
SetEndOfFile
SetFilePointer
WriteFile
GetCommandLineA
GetLastError
GetModuleHandleA
MultiByteToWideChar
TlsSetValue
WideCharToMultiByte
LocalAlloc
LocalFree
VirtualAlloc
VirtualFree
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
WaitForMultipleObjects
CreateThread
CreateEventA
InitializeSListHead
SetEvent
SetConsoleTitleA
GetLongPathNameW
FindNextVolumeMountPointW
HeapUnlock
UnregisterWaitEx
ReadConsoleInputA
GetSystemTimeAsFileTime
GetStartupInfoA
HeapAlloc
OutputDebugStringA
HeapFree
HeapReAlloc
GetTimeZoneInformation
GetModuleHandleW
TlsAlloc
TlsFree
InterlockedIncrement
InterlockedDecrement
GetCurrentThreadId
LoadLibraryExA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
HeapDestroy
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetCPInfo
Sections
.text Size: 137KB - Virtual size: 136KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 38KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ