Static task
static1
Behavioral task
behavioral1
Sample
cc14071e060d8b0d182ec22627696c6b2af883af51bbd7dcf3881236b1e34b93.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
cc14071e060d8b0d182ec22627696c6b2af883af51bbd7dcf3881236b1e34b93.dll
Resource
win10v2004-20220812-en
General
-
Target
cc14071e060d8b0d182ec22627696c6b2af883af51bbd7dcf3881236b1e34b93
-
Size
209KB
-
MD5
d14b1ee311dd4cdeafbd20f6306d8530
-
SHA1
35946774f261cf96ecebadf6c4647e8d08e931e3
-
SHA256
cc14071e060d8b0d182ec22627696c6b2af883af51bbd7dcf3881236b1e34b93
-
SHA512
16ece056bc8cc57830e701efd0ee8de604bebb16ff18e0137ce159b492bdcfb8a986ac4d64f9a55b3e4610c6591931744e9cf959fbca7a63f0be771ba7e91c8f
-
SSDEEP
6144:fMod5j7uVeHSnh4T+jxoctnUfx1G0lLjgb1SjIxyubz4AL:fj0ekhu2ZUfx1bLc1S1m4AL
Malware Config
Signatures
Files
-
cc14071e060d8b0d182ec22627696c6b2af883af51bbd7dcf3881236b1e34b93.dll windows x86
fc28052ef66faa602d93263899211ec9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
lstrlenW
lstrcpyW
VirtualAlloc
GetWindowsDirectoryA
AddAtomW
BackupSeek
BeginUpdateResourceW
BuildCommDCBW
CopyFileA
CopyFileW
CreateDirectoryW
CreateThread
DuplicateHandle
EnumCalendarInfoW
EnumDateFormatsW
EnumLanguageGroupLocalesW
EnumResourceNamesW
FileTimeToDosDateTime
FindFirstVolumeMountPointW
FindFirstVolumeW
FindVolumeMountPointClose
FreeLibrary
FreeResource
GetAtomNameW
GetBinaryTypeA
GetCPInfo
GetCommMask
GetCommProperties
GetCompressedFileSizeW
GetConsoleAliasExesLengthA
GetConsoleAliasesA
GetConsoleFontSize
GetConsoleTitleA
GetCurrencyFormatA
GetDateFormatA
GetEnvironmentStringsA
GetLogicalDriveStringsA
GetLongPathNameW
GetOEMCP
GetPriorityClass
GetPrivateProfileSectionNamesW
GetPrivateProfileStringA
GetPrivateProfileStructW
GetProcessAffinityMask
GetProcessPriorityBoost
GetProcessShutdownParameters
GetShortPathNameA
GetWindowsDirectoryW
GetTempFileNameA
GetVersion
GlobalDeleteAtom
GlobalFree
GlobalWire
Heap32ListNext
HeapDestroy
HeapSize
InitializeCriticalSection
IsBadStringPtrW
IsBadWritePtr
LocalReAlloc
LocalUnlock
LockResource
Module32NextW
OpenMutexA
OutputDebugStringA
Process32Next
QueryPerformanceCounter
QueueUserAPC
ReadFile
ResumeThread
RtlFillMemory
RtlUnwind
SetCommConfig
SetConsoleTitleA
SetConsoleWindowInfo
SetCriticalSectionSpinCount
SetCurrentDirectoryW
SetEnvironmentVariableW
SetLocaleInfoA
SetMailslotInfo
SetProcessPriorityBoost
SetThreadExecutionState
SetThreadIdealProcessor
SetVolumeLabelA
SetVolumeMountPointA
SignalObjectAndWait
SystemTimeToTzSpecificLocalTime
TlsAlloc
TlsGetValue
UnhandledExceptionFilter
UpdateResourceW
VirtualFreeEx
WinExec
WriteFileGather
WriteProcessMemory
_lwrite
lstrcmpA
GetShortPathNameW
CreateFileW
user32
wvsprintfW
ActivateKeyboardLayout
BroadcastSystemMessageA
BroadcastSystemMessageW
CallWindowProcW
ChangeDisplaySettingsExA
CharPrevW
CheckMenuItem
ClientToScreen
CreateDesktopW
CreatePopupMenu
DdeCreateStringHandleW
DdeGetLastError
DdeImpersonateClient
DefMDIChildProcA
DeleteMenu
DestroyWindow
DialogBoxIndirectParamA
DispatchMessageW
DlgDirListA
DlgDirListComboBoxA
DragObject
DrawEdge
DrawFrameControl
DrawMenuBar
DrawStateA
EditWndProc
EmptyClipboard
EnableWindow
EndPaint
EnumChildWindows
EnumDesktopsW
EnumDisplaySettingsExW
EnumDisplaySettingsW
EnumWindowStationsA
EnumWindows
FreeDDElParam
GetAltTabInfoA
GetClassInfoExA
GetClipCursor
GetComboBoxInfo
GetFocus
GetForegroundWindow
GetKeyboardLayoutNameA
GetKeyboardLayoutNameW
GetLastActivePopup
GetMenuCheckMarkDimensions
GetMenuItemID
GetMessageA
GetMonitorInfoW
GetOpenClipboardWindow
GetSysColor
GetSystemMenu
GetUserObjectSecurity
GetWindow
GetWindowModuleFileName
GetWindowThreadProcessId
IMPGetIMEW
IMPQueryIMEW
IMPSetIMEA
InflateRect
IsDialogMessageA
LoadBitmapW
MessageBeep
MessageBoxA
MessageBoxW
MonitorFromRect
OpenClipboard
OpenDesktopA
OpenInputDesktop
OpenWindowStationA
OpenWindowStationW
PtInRect
RegisterHotKey
ReleaseCapture
ScrollWindow
SendDlgItemMessageW
SendMessageA
SetLastErrorEx
SetScrollPos
SetShellWindow
SetWindowContextHelpId
SetWindowsHookExA
ShowOwnedPopups
ShowScrollBar
SwitchToThisWindow
ToUnicode
TranslateAcceleratorA
SwitchDesktop
UnpackDDElParam
advapi32
RegOpenKeyExA
ole32
WriteOleStg
WriteFmtUserTypeStg
WdtpInterfacePointer_UserUnmarshal
WdtpInterfacePointer_UserFree
UtConvertDvtd16toDvtd32
StringFromCLSID
StgPropertyLengthAsVariant
StgIsStorageFile
StgCreateStorageEx
StgCreatePropSetStg
StgConvertVariantToProperty
SNB_UserUnmarshal
ReadOleStg
PropStgNameToFmtId
ProgIDFromCLSID
OleSetContainedObject
OleSetAutoConvert
OleRun
OleRegEnumFormatEtc
OleLockRunning
OleLoad
OleGetIconOfClass
OleDuplicateData
OleDraw
OleCreateStaticFromData
OleCreateLinkEx
OleCreateFromFileEx
OleCreateFromData
OleCreateEx
OleConvertOLESTREAMToIStorage
OleBuildVersion
MonikerRelativePathTo
IsEqualGUID
IIDFromString
HWND_UserFree
HPALETTE_UserUnmarshal
HMETAFILE_UserUnmarshal
HMETAFILEPICT_UserMarshal
HMENU_UserUnmarshal
HMENU_UserMarshal
HICON_UserFree
HGLOBAL_UserSize
HENHMETAFILE_UserFree
HDC_UserSize
HDC_UserFree
HBRUSH_UserFree
HACCEL_UserMarshal
GetRunningObjectTable
GetHookInterface
FmtIdToPropStgName
DoDragDrop
DcomChannelSetHResult
CreateStreamOnHGlobal
CreateObjrefMoniker
CreateFileMoniker
CreateClassMoniker
CreateAntiMoniker
CoUnloadingWOW
CoUninitialize
CoTreatAsClass
CoSuspendClassObjects
CoSetProxyBlanket
CoRegisterSurrogateEx
CoRegisterMessageFilter
CoRegisterMallocSpy
CoRegisterClassObject
CoReactivateObject
CoQueryAuthenticationServices
CoIsHandlerConnected
CoInstall
CoInitializeWOW
CoInitialize
CoImpersonateClient
CoGetTreatAsClass
CoGetStdMarshalEx
CoGetObjectContext
CoGetMalloc
CoGetInterfaceAndReleaseStream
CoGetInstanceFromIStorage
CoEnableCallCancellation
CoDosDateTimeToFileTime
CoDisableCallCancellation
CoCreateObjectInContext
CoBuildVersion
CLSIDFromProgIDEx
CLIPFORMAT_UserUnmarshal
BindMoniker
oleaut32
VarUI4FromI2
VarUI4FromI1
VarUI4FromCy
VarUI4FromBool
VarUI2FromI4
VarUI2FromI2
VarUI2FromI1
VarUI2FromDec
VarUI1FromR4
VarUI1FromI4
VarUI1FromI1
VarUI1FromDec
VarUI1FromCy
VarUI1FromBool
VarR8FromUI4
VarR8FromR4
VarR8FromI4
VarR8FromBool
VarR4FromI4
VarR4FromI1
VarR4FromCy
VarNot
VarNeg
VarMod
VarI4FromUI4
VarI4FromUI1
VarI4FromDec
VarI4FromDate
VarI2FromUI2
VarI2FromStr
VarI2FromR8
VarI2FromI4
VarI2FromI1
VarI2FromDec
VarI2FromCy
VarI2FromBool
VarI1FromI2
VarI1FromDec
VarFormatDateTime
VarFormatCurrency
VarFix
VarDecFromUI1
VarDecFromR4
VarDecDiv
VarDecAdd
VarDateFromUdateEx
VarDateFromStr
VarDateFromI1
VarDateFromBool
VarCyRound
VarCyInt
VarCyFromR8
VarCyFromR4
VarCyFix
VarCyAdd
VarBstrFromUI4
VarBstrFromR8
VarBstrFromDisp
VarBstrFromDate
VarBstrCmp
VarBoolFromUI2
VarBoolFromUI1
VARIANT_UserUnmarshal
VARIANT_UserSize
SysStringLen
SysReAllocString
SysAllocStringByteLen
SafeArrayLock
SafeArrayGetRecordInfo
SafeArrayGetLBound
SafeArrayDestroy
SafeArrayCreateVector
SafeArrayCreate
RevokeActiveObject
RegisterActiveObject
OleLoadPictureFileEx
OleCreatePictureIndirect
LoadTypeLi
LPSAFEARRAY_UserMarshal
LPSAFEARRAY_Unmarshal
LHashValOfNameSys
GetErrorInfo
DosDateTimeToVariantTime
CreateTypeLib2
CreateStdDispatch
CreateDispTypeInfo
VariantInit
VarUI4FromUI2
Sections
.text Size: 196KB - Virtual size: 196KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 188B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ