mcicrtClock
Static task
static1
Behavioral task
behavioral1
Sample
cc88e4c26684a9ca89b01e66c5d8a9aa25dff5e91ec2c9f7f6f42d86fe928f0b.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cc88e4c26684a9ca89b01e66c5d8a9aa25dff5e91ec2c9f7f6f42d86fe928f0b.dll
Resource
win10v2004-20220812-en
General
-
Target
cc88e4c26684a9ca89b01e66c5d8a9aa25dff5e91ec2c9f7f6f42d86fe928f0b
-
Size
152KB
-
MD5
bfe38febc43ca6d9f9d5c95d38a2fbd4
-
SHA1
4bfcd27d68db550c3d6325ff8fdea3f8448928f5
-
SHA256
cc88e4c26684a9ca89b01e66c5d8a9aa25dff5e91ec2c9f7f6f42d86fe928f0b
-
SHA512
ff9b56ecbd3c8e994f76d73786641619c88cb4bf5061a2cffffc22d6947e51dda53f4c09405ee322ec8b865051262c334d29618254a74ed303099a98bd8578b2
-
SSDEEP
3072:GG0XgpTTg54sJSL/LRzdFq48u/odxMf0HN9u9OEw:ngIY4yK/13jQXu0Ew
Malware Config
Signatures
Files
-
cc88e4c26684a9ca89b01e66c5d8a9aa25dff5e91ec2c9f7f6f42d86fe928f0b.dll windows x86
ac65a4e0073bcb3dc914201ba02fd39c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
UnmapViewOfFile
GetProcessHeap
WriteFile
CreateFileMappingA
GetProcAddress
LeaveCriticalSection
GetTickCount
HeapAlloc
InterlockedCompareExchange
OpenEventA
LocalFree
CreateFileA
CreateDirectoryA
CreateEventA
InterlockedDecrement
WriteProcessMemory
Sleep
GetLastError
EnterCriticalSection
TerminateProcess
InterlockedIncrement
CreateProcessA
MapViewOfFile
GetCommandLineA
CloseHandle
LoadLibraryA
GetVolumeInformationA
GlobalAlloc
GetModuleHandleA
GetModuleFileNameA
GetCurrentProcess
GlobalFree
SetLastError
ExitProcess
OpenFileMappingA
CreateMutexW
HeapFree
ReadProcessMemory
WaitForSingleObject
GetComputerNameA
CopyFileA
ole32
CoSetProxyBlanket
CoUninitialize
CoCreateGuid
CoInitialize
OleCreate
CoCreateInstance
CoTaskMemAlloc
OleSetContainedObject
user32
GetCursorPos
GetParent
SetWindowLongA
GetSystemMetrics
GetWindow
PeekMessageA
GetMessageA
SendMessageA
DestroyWindow
DispatchMessageA
PostQuitMessage
KillTimer
RegisterWindowMessageA
FindWindowA
TranslateMessage
GetWindowLongA
GetWindowThreadProcessId
UnhookWindowsHookEx
DefWindowProcA
SetWindowsHookExA
ClientToScreen
SetTimer
GetClassNameA
CreateWindowExA
ScreenToClient
oleaut32
SysStringLen
SysAllocStringLen
SysAllocString
SysFreeString
shlwapi
UrlUnescapeW
StrStrIW
advapi32
RegOpenKeyExA
RegDeleteValueA
RegDeleteKeyA
DuplicateTokenEx
RegCloseKey
GetUserNameA
SetTokenInformation
RegCreateKeyExA
RegSetValueExA
OpenProcessToken
RegQueryValueExA
shell32
SHGetFolderPathA
Exports
Exports
Sections
.text Size: 120KB - Virtual size: 117KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 992B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
qdhabrg Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ