Static task
static1
Behavioral task
behavioral1
Sample
cc46241fe7608236c4e5f0738026602e5cfc4a85aa269fbf1967c4984c48681b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
cc46241fe7608236c4e5f0738026602e5cfc4a85aa269fbf1967c4984c48681b.exe
Resource
win10v2004-20221111-en
General
-
Target
cc46241fe7608236c4e5f0738026602e5cfc4a85aa269fbf1967c4984c48681b
-
Size
254KB
-
MD5
3c650963f0a90d81d55da8475932ea80
-
SHA1
ecbeed529aeedfb7becfef5d8546f853b48aee34
-
SHA256
cc46241fe7608236c4e5f0738026602e5cfc4a85aa269fbf1967c4984c48681b
-
SHA512
ca55899f7989def095bf98e19d4d9fd0aa7505a41d2dcf21d9a647a034546dbd87170b5f7376257608b1445d3a023c744c4bdb3db95d67c87c1b3718629a70eb
-
SSDEEP
3072:ynQk9L5B0tXwRusQmmw0QeUCyhGaTbzXTjah1L5D:eZ9wtXwljrs
Malware Config
Signatures
Files
-
cc46241fe7608236c4e5f0738026602e5cfc4a85aa269fbf1967c4984c48681b.exe windows x86
35653bea71ef7d5491926549eba0ec99
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetConsoleMode
GetExitCodeThread
OpenThread
OutputDebugStringW
GetFileAttributesA
GetSystemInfo
QueryPerformanceFrequency
GetDateFormatA
GetVersionExA
FindFirstFileW
GetTimeFormatA
InterlockedCompareExchange
CreateProcessW
GetFileAttributesW
GetFullPathNameW
lstrcpynW
CreateDirectoryW
LocalFree
SetFileAttributesW
GetFileTime
CopyFileW
OpenProcess
GetVersionExW
GetConsoleMode
VirtualFree
InterlockedExchange
CreateMutexA
CompareStringW
GetProcessHeap
SetStdHandle
GetLocaleInfoW
IsValidLocale
lstrlenW
GetStartupInfoW
HeapDestroy
GetACP
HeapAlloc
LoadLibraryW
InterlockedDecrement
GetLastError
SetLastError
IsProcessorFeaturePresent
GetCommandLineA
HeapFree
GetFileType
GetModuleFileNameA
WideCharToMultiByte
HeapCreate
GetOEMCP
EnterCriticalSection
FreeLibrary
GetModuleFileNameW
UnhandledExceptionFilter
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetFullPathNameA
SetErrorMode
FlushFileBuffers
SetFilePointer
GetConsoleCP
InitializeCriticalSectionAndSpinCount
LoadLibraryA
WriteFile
GetTimeZoneInformation
GetStartupInfoA
GetStdHandle
SetHandleCount
HeapSize
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
HeapReAlloc
VirtualAlloc
GetCPInfo
LCMapStringW
LCMapStringA
RtlUnwind
RaiseException
FindFirstFileA
GetDriveTypeA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
GetModuleHandleA
GetProcAddress
GetModuleHandleW
GetSystemTimeAsFileTime
IsDebuggerPresent
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
InterlockedIncrement
GetUserDefaultLCID
GetLocaleInfoA
SetEnvironmentVariableA
CompareStringA
SetEndOfFile
CreateFileW
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetStringTypeW
GetStringTypeA
EnumSystemLocalesA
lstrcmpA
Sleep
ReadFile
CreateFileA
CreateProcessA
GetTempPathA
MultiByteToWideChar
CloseHandle
lstrlenA
ExitProcess
BackupRead
GetVolumeInformationW
RemoveDirectoryW
OutputDebugStringA
MoveFileExW
GetTempPathW
GetCompressedFileSizeW
FindNextFileW
GetFileInformationByHandle
GetCurrentThread
GetFileAttributesExW
UnmapViewOfFile
CreateFileMappingA
DisableThreadLibraryCalls
IsDBCSLeadByte
WaitForSingleObject
SetEvent
CreateThread
CreateEventA
CreateMutexW
GetDiskFreeSpaceA
OpenFileMappingA
OpenFileMappingW
CreateFileMappingW
MoveFileA
MoveFileW
DeleteFileA
DeleteFileW
FlushViewOfFile
ReleaseMutex
IsBadReadPtr
CompareFileTime
GetEnvironmentVariableA
lstrcpynA
IsValidCodePage
VirtualQuery
user32
CharLowerBuffA
SetTimer
CharUpperA
DestroyWindow
GetWindowLongA
DefWindowProcA
UnregisterClassA
FindWindowW
GetWindowThreadProcessId
IsWindow
RegisterClassA
GetClassInfoA
CreateWindowExA
AllowSetForegroundWindow
wsprintfA
CharLowerBuffW
advapi32
RegSetValueExW
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
GetFileSecurityW
GetUserNameW
ReportEventW
GetExplicitEntriesFromAclW
GetTokenInformation
GetLengthSid
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
RegQueryValueExW
DeregisterEventSource
OpenThreadToken
RevertToSelf
AccessCheck
SetSecurityDescriptorOwner
GetSecurityDescriptorControl
SetSecurityDescriptorControl
FreeSid
AllocateAndInitializeSid
RegDeleteKeyA
RegOpenKeyExA
RegCloseKey
RegCreateKeyExA
RegQueryValueExA
RegDeleteValueA
RegSetValueExA
RegOpenKeyExW
shell32
SHGetDesktopFolder
SHGetSpecialFolderLocation
SHGetPathFromIDListW
SHGetMalloc
SHFileOperationW
ole32
CoCreateInstance
CoUninitialize
CLSIDFromString
CoInitialize
CoQueryProxyBlanket
CoSetProxyBlanket
msvcrt
_chmod
crypt32
CertCloseStore
CertFindCertificateInStore
CertGetNameStringW
shlwapi
PathRenameExtensionW
StrCmpW
StrCmpIW
PathFileExistsW
PathRemoveFileSpecW
PathIsFileSpecW
PathIsURLA
StrStrA
StrStrIA
PathRemoveFileSpecA
StrToIntExA
winmm
waveOutGetNumDevs
waveOutUnprepareHeader
waveOutGetDevCapsA
waveOutReset
waveOutPrepareHeader
wininet
InternetCloseHandle
urlmon
URLDownloadToFileA
Sections
.text Size: 36KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 52KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 80KB - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 68KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ