Static task
static1
Behavioral task
behavioral1
Sample
ccd78b14c6057b3e193baf4cfdf47de5335180974de37389a8723907f505c7da.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ccd78b14c6057b3e193baf4cfdf47de5335180974de37389a8723907f505c7da.exe
Resource
win10v2004-20220812-en
General
-
Target
ccd78b14c6057b3e193baf4cfdf47de5335180974de37389a8723907f505c7da
-
Size
127KB
-
MD5
24d114382d0ec8c67c6d9972c1bbc24c
-
SHA1
561338670b4edbd096f22da4332c6775d475fefc
-
SHA256
ccd78b14c6057b3e193baf4cfdf47de5335180974de37389a8723907f505c7da
-
SHA512
ccd55484e0525d4cca238f815f6e813a20c96115745e639fa99df39fab95fbc4340f852df5a4abad97b61967b678b4dd67cc8eb8a06637f83eeab376c5015fd4
-
SSDEEP
3072:x2AaEQfUk0cTok7cqJQ0x0SK3apJoHhVTMYf6w:x6VMk7/Q0xYHThf6
Malware Config
Signatures
Files
-
ccd78b14c6057b3e193baf4cfdf47de5335180974de37389a8723907f505c7da.exe windows x86
9ebc0950e074721e8a8ee30268ef0dea
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
FindResourceA
GlobalFlags
FreeLibrary
SignalObjectAndWait
GetProcAddress
GetConsoleCursorInfo
GetFileType
GetModuleHandleA
GetCommMask
LockResource
GetProfileStringA
EndUpdateResourceA
DefineDosDeviceA
VirtualFreeEx
GetWindowsDirectoryA
GetTempPathA
CallNamedPipeA
PulseEvent
LoadResource
HeapValidate
GetExitCodeProcess
CreateMailslotA
OpenSemaphoreA
DeviceIoControl
CreateConsoleScreenBuffer
LoadLibraryExA
LocalSize
LocalReAlloc
GetVolumeInformationA
WriteFile
VirtualAllocEx
GetTickCount
GetProfileSectionA
FlushFileBuffers
IsBadReadPtr
GetEnvironmentStrings
GetThreadPriority
GetProcessVersion
CreateSemaphoreA
LocalHandle
SetLastError
PurgeComm
CreateFiber
VirtualFree
MoveFileA
WriteProfileSectionA
MapViewOfFileEx
Beep
PostQueuedCompletionStatus
GlobalAddAtomA
FlushInstructionCache
WideCharToMultiByte
GetCommConfig
WritePrivateProfileStringA
GetProcessHeap
HeapAlloc
HeapDestroy
GlobalUnfix
GlobalUnlock
GetProfileIntA
GetCurrentThreadId
GlobalAlloc
GlobalReAlloc
VirtualAlloc
QueryPerformanceCounter
AreFileApisANSI
GetUserDefaultLCID
GetThreadLocale
CommConfigDialogA
SetEvent
GlobalUnWire
BeginUpdateResourceA
OutputDebugStringA
GetNamedPipeInfo
FindAtomA
SleepEx
GetCommandLineA
WaitForSingleObject
GlobalFindAtomA
GetSystemDefaultLangID
LocalFree
ConnectNamedPipe
GetProcessTimes
LockFile
InitAtomTable
GlobalCompact
GetThreadContext
UnmapViewOfFile
LocalUnlock
OpenFileMappingA
CloseHandle
GetCPInfoExA
GetLogicalDrives
SizeofResource
GlobalHandle
Sleep
ReleaseSemaphore
GetConsoleOutputCP
FoldStringA
IsProcessorFeaturePresent
GetLogicalDriveStringsA
QueryDosDeviceA
WaitForSingleObjectEx
FindFirstChangeNotificationA
VirtualProtect
GetFileTime
CopyFileA
GetThreadTimes
DeleteFiber
OpenEventA
CancelWaitableTimer
CreateDirectoryExA
WaitForMultipleObjects
IsValidCodePage
LoadLibraryA
PeekNamedPipe
GetCurrentThread
GetLargestConsoleWindowSize
VirtualQuery
GetThreadSelectorEntry
GetACP
LocalCompact
FormatMessageA
GetThreadPriorityBoost
CancelIo
MapViewOfFile
WritePrivateProfileSectionA
GetDiskFreeSpaceA
GlobalWire
GetCurrentProcessId
FindClose
ReleaseMutex
UpdateResourceA
GlobalSize
GetPrivateProfileIntA
SearchPathA
FindResourceExA
GetVersion
ReadProcessMemory
CreateFileA
IsBadHugeWritePtr
HeapReAlloc
EraseTape
GlobalFix
IsBadCodePtr
GetPrivateProfileStructA
GetProcessAffinityMask
QueueUserAPC
GetCPInfo
GetStartupInfoA
msvcrt
time
srand
__set_app_type
_controlfp
exit
strstr
Sections
.text Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE