Static task
static1
Behavioral task
behavioral1
Sample
cc802232dcd0181c98a4b6df8b5033aaa04b3ecea475ad8f31ab5272952e22af.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
cc802232dcd0181c98a4b6df8b5033aaa04b3ecea475ad8f31ab5272952e22af.exe
Resource
win10v2004-20220901-en
General
-
Target
cc802232dcd0181c98a4b6df8b5033aaa04b3ecea475ad8f31ab5272952e22af
-
Size
38KB
-
MD5
4b63aba585873e9a72db25c88ee3a2c2
-
SHA1
3f7ed1c630c61b06d4c9e512c219044240cb4871
-
SHA256
cc802232dcd0181c98a4b6df8b5033aaa04b3ecea475ad8f31ab5272952e22af
-
SHA512
316438a0629638d94863c06e16ae7935d176cb57c059f256cc0bf5dc6583d243f0d519ed4a9615b800549e0d0f30af187faac07d62e46d9f3e2ca1d44ae9aaae
-
SSDEEP
384:vgD1USdmkMFApfnQkI4LRusAJVqDDfhwNeaeVbGe6B1bagJmApN5PPiojcQd3M42:vgRLZMFoQkhsNbLLY4o4o74/zn2
Malware Config
Signatures
Files
-
cc802232dcd0181c98a4b6df8b5033aaa04b3ecea475ad8f31ab5272952e22af.exe windows x86
97b0d491ace7bdccd1e879ccc4c857a7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
mouse_event
DestroyWindow
DialogBoxParamA
EndDialog
EnumWindows
GetDC
GetDesktopWindow
GetSystemMetrics
GetWindowTextA
GetWindowThreadProcessId
IsWindowVisible
KillTimer
MessageBoxA
ReleaseDC
SendMessageA
SetLayeredWindowAttributes
SetTimer
ShowWindow
keybd_event
wsprintfA
gdi32
SelectObject
GetDIBits
DeleteObject
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
CreateDCA
DeleteDC
CreateDIBSection
kernel32
CreateToolhelp32Snapshot
DeleteFileA
ExitProcess
FindClose
FindFirstFileA
FindNextFileA
FreeLibrary
GetCurrentDirectoryA
GetCurrentProcess
GetDiskFreeSpaceA
CreateThread
GetFileAttributesA
GetFileSize
GetLastError
GetLogicalDriveStringsA
GetModuleHandleA
GetProcAddress
GetProfileIntA
GetProfileStringA
GetStartupInfoA
GetSystemDirectoryA
GetSystemInfo
CreateProcessA
GetVersionExA
GetVolumeInformationA
GlobalAlloc
GlobalFree
GlobalMemoryStatus
LoadLibraryA
Module32First
Module32Next
OpenMutexA
OpenProcess
Process32First
Process32Next
ReadFile
ReleaseMutex
RemoveDirectoryA
RtlZeroMemory
Sleep
TerminateProcess
WinExec
WriteFile
CreatePipe
WriteProfileStringA
lstrcatA
lstrcmpA
lstrcmpiA
lstrcpyA
lstrlenA
CreateMutexA
CreateFileA
CreateDirectoryA
CloseHandle
GetTickCount
GetDriveTypeA
WriteProfileSectionA
ws2_32
inet_addr
recv
select
WSACleanup
htons
socket
WSACloseEvent
WSACreateEvent
gethostname
gethostbyname
connect
closesocket
WSAWaitForMultipleEvents
WSAStartup
sendto
WSAGetLastError
WSAEnumNetworkEvents
send
WSAEventSelect
wininet
InternetCloseHandle
InternetOpenUrlA
InternetReadFile
InternetOpenA
shlwapi
StrToIntA
StrToIntExA
shell32
ShellExecuteA
SHFileOperationA
oleaut32
SysAllocStringByteLen
SysFreeString
advapi32
CreateServiceA
AdjustTokenPrivileges
ChangeServiceConfig2A
CloseServiceHandle
EnumServicesStatusA
LookupPrivilegeValueA
StartServiceA
RegSetValueExA
RegSaveKeyA
RegRestoreKeyA
RegQueryValueExA
RegOpenKeyExA
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegCloseKey
QueryServiceConfigA
QueryServiceConfig2A
OpenProcessToken
OpenSCManagerA
OpenServiceA
ControlService
DeleteService
avicap32
capCreateCaptureWindowA
winmm
waveInStart
waveInReset
waveInPrepareHeader
waveInOpen
waveInClose
waveInAddBuffer
waveInUnprepareHeader
psapi
GetModuleFileNameExA
urlmon
URLDownloadToFileA
Sections
.text Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ