Static task
static1
Behavioral task
behavioral1
Sample
ccf46aeffd860360d5948a7a4762a26660796e42627ae3f743abc71ac9e81991.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ccf46aeffd860360d5948a7a4762a26660796e42627ae3f743abc71ac9e81991.exe
Resource
win10v2004-20220812-en
General
-
Target
ccf46aeffd860360d5948a7a4762a26660796e42627ae3f743abc71ac9e81991
-
Size
230KB
-
MD5
c295ff8130719f0004218d512db16bb0
-
SHA1
714fbd00895818c79f7d49c35b5b39ce03a06668
-
SHA256
ccf46aeffd860360d5948a7a4762a26660796e42627ae3f743abc71ac9e81991
-
SHA512
602ba65adc2c27485c8faa0d93f72701a388421c26a3143f7049825acc8564cc2cdc384af1de5dfce89e723d56591ed3d7b39bb1f58280fb56102bc7fbb73488
-
SSDEEP
6144:9Ix8tV7GU/jgvooihNOZw2KLfHmnN5kE/ODs39E:CqV7GSjgUNOZw2wSNqE4a9E
Malware Config
Signatures
Files
-
ccf46aeffd860360d5948a7a4762a26660796e42627ae3f743abc71ac9e81991.exe windows x86
7bcff35b83bdc705f47e7e3df8553178
Code Sign
70:ba:e4:1d:10:d9:29:34:b6:38:ca:7b:03:cc:ba:bfCertificate
IssuerOU=Class 3 Public Primary Certification Authority,O=VeriSign\, Inc.,C=USNot Before29/01/1996, 00:00Not After01/08/2028, 23:59SubjectOU=Class 3 Public Primary Certification Authority,O=VeriSign\, Inc.,C=US38:25:d7:fa:f8:61:af:9e:f4:90:e7:26:b5:d6:5a:d5Certificate
IssuerCN=VeriSign Time Stamping Services CA,O=VeriSign\, Inc.,C=USNot Before15/06/2007, 00:00Not After14/06/2012, 23:59SubjectCN=VeriSign Time Stamping Services Signer - G2,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
47:bf:19:95:df:8d:52:46:43:f7:db:6d:48:0d:31:a4Certificate
IssuerCN=Thawte Timestamping CA,OU=Thawte Certification,O=Thawte,L=Durbanville,ST=Western Cape,C=ZANot Before04/12/2003, 00:00Not After03/12/2013, 23:59SubjectCN=VeriSign Time Stamping Services CA,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
1c:2d:d6:1a:35:e6:5d:f6:29:97:01:ff:9b:e5:ca:44Certificate
IssuerCN=VeriSign Class 3 Code Signing 2009-2 CA,OU=VeriSign Trust Network+OU=Terms of use at https://www.verisign.com/rpa (c)09,O=VeriSign\, Inc.,C=USNot Before20/01/2010, 00:00Not After24/01/2012, 23:59SubjectCN=BITDEFENDER LLC,OU=Digital ID Class 3 - Microsoft Software Validation v2,O=BITDEFENDER LLC,L=Fort Lauderdale,ST=Florida,C=USExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
65:52:26:e1:b2:2e:18:e1:59:0f:29:85:ac:22:e7:5cCertificate
IssuerOU=Class 3 Public Primary Certification Authority,O=VeriSign\, Inc.,C=USNot Before21/05/2009, 00:00Not After20/05/2019, 23:59SubjectCN=VeriSign Class 3 Code Signing 2009-2 CA,OU=VeriSign Trust Network+OU=Terms of use at https://www.verisign.com/rpa (c)09,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
4b:ae:f9:96:36:9c:5c:e0:70:6a:8e:26:1c:87:23:31:7a:54:fb:99Signer
Actual PE Digest4b:ae:f9:96:36:9c:5c:e0:70:6a:8e:26:1c:87:23:31:7a:54:fb:99Digest Algorithmsha1PE Digest MatchesfalseSignature Validations
TrustedfalseVerification
Signing CertificateCN=BITDEFENDER LLC,OU=Digital ID Class 3 - Microsoft Software Validation v2,O=BITDEFENDER LLC,L=Fort Lauderdale,ST=Florida,C=US07/05/2010, 16:02 Valid: false
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DisconnectNamedPipe
GetSystemInfo
OpenEventW
FileTimeToDosDateTime
lstrcpynA
lstrcpyW
GetLogicalDrives
GetStartupInfoW
EnumDateFormatsA
FileTimeToLocalFileTime
lstrcpy
GetMailslotInfo
DuplicateHandle
GetUserDefaultLCID
GetTimeFormatW
EnumCalendarInfoW
GetProcAddress
DeleteAtom
GetSystemDefaultLangID
GetModuleHandleA
GetFileAttributesA
SetComputerNameA
GetNumberFormatA
WaitForMultipleObjects
GetModuleHandleW
EnumDateFormatsW
GetModuleHandleA
SystemTimeToFileTime
user32
GetIconInfo
GetSysColor
CreateDialogParamA
CreateDialogIndirectParamA
PeekMessageA
SetActiveWindow
CreateDialogIndirectParamW
PostMessageW
MessageBoxIndirectA
DefWindowProcW
LoadImageA
SetDlgItemTextA
IsMenu
UnregisterClassA
MonitorFromRect
AppendMenuW
GetActiveWindow
LoadMenuA
mouse_event
DestroyMenu
GetTopWindow
GetClassInfoA
GetMessageA
RemoveMenu
InvalidateRgn
EndMenu
GetClassInfoExW
SetWindowPos
CharNextW
OpenClipboard
SendDlgItemMessageW
EnumWindows
GetDCEx
PeekMessageW
GetMenuState
WaitMessage
CharPrevA
LoadMenuIndirectA
LoadImageW
AppendMenuA
CharLowerA
MonitorFromPoint
GetDlgItemTextA
GetMenuItemRect
TrackPopupMenuEx
wvsprintfW
CopyIcon
gdi32
GetTextExtentPointW
RemoveFontResourceW
CreateEllipticRgn
GdiGetBatchLimit
CreatePalette
CreateDIBPatternBrush
CreateFontW
DeleteObject
GetMetaFileW
CreateCompatibleDC
CreateBitmap
AddFontResourceW
CreateBitmapIndirect
TranslateCharsetInfo
GetStockObject
CreatePatternBrush
CreateMetaFileW
advapi32
RegQueryValueExA
RegEnumKeyW
RegCloseKey
RegOpenKeyExA
RegDeleteKeyW
RegCreateKeyW
RegQueryMultipleValuesA
RegQueryValueA
RegQueryInfoKeyA
RegOpenKeyExW
RegOpenKeyA
comdlg32
ChooseFontA
GetSaveFileNameW
PrintDlgA
GetOpenFileNameA
GetFileTitleW
ole32
CoInitialize
CoInitializeEx
CLSIDFromString
GetClassFile
opengl32
glReadPixels
wglShareLists
wglCreateLayerContext
glColor3usv
glColor4d
wininet
InternetUnlockRequestFile
HttpSendRequestA
SetUrlCacheEntryGroupA
InternetDialA
InternetSetCookieW
InternetConnectA
RetrieveUrlCacheEntryStreamA
InternetFindNextFileW
GopherGetLocatorTypeW
InternetDial
InternetQueryFortezzaStatus
InternetSetPerSiteCookieDecisionW
FtpGetCurrentDirectoryA
InternetSetOptionW
GopherFindFirstFileA
GetUrlCacheGroupAttributeW
winspool.drv
EnumJobsA
ConfigurePortW
XcvDataW
StartDocDlgW
ResetPrinterW
Sections
.UEbd Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Ld Size: 3KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Nx Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.D Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.ayFaSc Size: 4KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.VNpUwF Size: 86KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UJvTm Size: 10KB - Virtual size: 101KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.nFNe Size: 5KB - Virtual size: 206KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ