Static task
static1
Behavioral task
behavioral1
Sample
cc870f662873f572b9de065a4833ee735432b26d57544e656fdedd22b35ff808.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
cc870f662873f572b9de065a4833ee735432b26d57544e656fdedd22b35ff808.exe
Resource
win10v2004-20221111-en
General
-
Target
cc870f662873f572b9de065a4833ee735432b26d57544e656fdedd22b35ff808
-
Size
232KB
-
MD5
c99e0ec324ac6c7492b66391a1739396
-
SHA1
f199260fbcfe475021c6660813b0c0bcf5d13d23
-
SHA256
cc870f662873f572b9de065a4833ee735432b26d57544e656fdedd22b35ff808
-
SHA512
7c04ef2c2f0ba2c3b9040c634b9d0b942001b387e0d4f424b2fba9387beb8814bf595e6b998cfceb4a57f5c039354c658369b25ef0949ca5fb1e470d122bc6d1
-
SSDEEP
6144:vTqMrAIQOHPhSgRpJqxqBIgY41vJnhzyoS2F8Yv:vT1cjecUpJUqBbY41vmSZv
Malware Config
Signatures
Files
-
cc870f662873f572b9de065a4833ee735432b26d57544e656fdedd22b35ff808.exe windows x86
ad43f0f0296d0935b20b9c028138eaf4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetComputerNameW
ExitProcess
LocalFree
lstrlenA
GetTickCount
GetCommandLineW
GetDiskFreeSpaceW
GetPrivateProfileIntA
ResumeThread
GetModuleHandleW
CloseHandle
CreateFileA
GetSystemTime
GetFileAttributesA
LoadLibraryA
GetTickCount
FindAtomW
SuspendThread
VirtualAlloc
ResetEvent
user32
GetClientRect
FillRect
CallWindowProcA
DestroyCaret
CloseWindow
GetClassInfoA
GetCaretPos
GetDlgItem
DrawStateA
GetMenu
CreateWindowExA
EndDialog
DispatchMessageA
rasapi32
DwEnumEntryDetails
RasDialA
DwRasUninitialize
RasDeleteEntryA
DwCloneEntry
adsnt
DllGetClassObject
Sections
.text Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 222KB - Virtual size: 221KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ