Static task
static1
Behavioral task
behavioral1
Sample
ccbc3f854dc37875f93ba8b88dfb5f785f35c58b4d8a81493da454f3ac4c1e79.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ccbc3f854dc37875f93ba8b88dfb5f785f35c58b4d8a81493da454f3ac4c1e79.exe
Resource
win10v2004-20220812-en
General
-
Target
ccbc3f854dc37875f93ba8b88dfb5f785f35c58b4d8a81493da454f3ac4c1e79
-
Size
55KB
-
MD5
812b58a1cf1e3403fc3a502927318b73
-
SHA1
8792319ad5f47d1303616cd5fc519fe999ec93d3
-
SHA256
ccbc3f854dc37875f93ba8b88dfb5f785f35c58b4d8a81493da454f3ac4c1e79
-
SHA512
1c77deb626491b8da50d4db4cd9fa2bfa09f293928ba7dcc96a719345066bf94b98e33afad37cb8c7b2cbd6bf41fdfab24c7ca69b2e9a9d50515612737899533
-
SSDEEP
768:mxowCSZNNlBT+2ewLIXetoJBctYmuFMeNF58RnrldAmOz2BdZ2ZimbdjKK:mhHBTxewtoJBctuJNF5GA2Z2ZZ2K
Malware Config
Signatures
Files
-
ccbc3f854dc37875f93ba8b88dfb5f785f35c58b4d8a81493da454f3ac4c1e79.exe windows x86
a00386beebe59c57dacbf8cfd80454e2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
IsBadReadPtr
IsBadWritePtr
UnmapViewOfFile
GetFileSize
MapViewOfFile
CreateFileMappingA
lstrcatA
GetTempPathA
SetCurrentDirectoryA
GetSystemDirectoryA
GetVersionExA
GetLastError
GetCurrentProcess
GetModuleFileNameA
Process32Next
OpenProcess
GetCurrentProcessId
Process32First
CreateToolhelp32Snapshot
TerminateProcess
SetPriorityClass
GetOverlappedResult
DeviceIoControl
VirtualProtect
WriteProcessMemory
VirtualAlloc
VirtualAllocEx
CreateRemoteThread
ReadProcessMemory
FreeLibrary
Sleep
SetErrorMode
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
FlushFileBuffers
SetEndOfFile
GetModuleHandleA
SetFilePointer
ReadFile
CreateFileA
WriteFile
WaitForSingleObject
CreateEventA
CreateThread
CloseHandle
SetEvent
GetFileAttributesA
SetFileAttributesA
DeleteFileA
CopyFileA
MoveFileA
RemoveDirectoryA
CreateDirectoryA
FindFirstFileA
FindNextFileA
FindClose
GetLogicalDriveStringsA
GetDriveTypeA
GetVersion
GetTickCount
GetStartupInfoA
user32
GetDC
SetWindowsHookExA
UnhookWindowsHookEx
CallNextHookEx
GetKeyNameTextA
ToAscii
GetKeyboardState
GetSystemMetrics
GetForegroundWindow
wsprintfA
UnregisterClassA
DispatchMessageA
SendInput
TranslateMessage
GetMessageA
CreateWindowExA
RegisterClassExA
GetWindowTextA
DestroyWindow
LoadCursorA
DefWindowProcA
SetTimer
PostQuitMessage
MessageBoxA
ExitWindowsEx
PostMessageA
IsWindow
SendMessageA
keybd_event
EnumWindows
GetWindowTextLengthA
GetWindowLongA
IsWindowVisible
BringWindowToTop
mouse_event
VkKeyScanA
SetForegroundWindow
GetWindowThreadProcessId
SetWindowTextA
SetWindowPos
ShowWindow
gdi32
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
BitBlt
GetDIBits
DeleteObject
DeleteDC
advapi32
RegDeleteKeyA
CreateServiceA
CloseServiceHandle
OpenServiceA
ControlService
DeleteService
RegCloseKey
RegOpenKeyExA
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegSetValueExA
RegQueryInfoKeyA
RegCreateKeyExA
RegQueryValueExA
StartServiceA
GetUserNameA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
OpenSCManagerA
shell32
ShellExecuteA
wsock32
inet_ntoa
getpeername
ntohs
closesocket
WSAGetLastError
bind
listen
socket
htons
WSAAsyncSelect
connect
WSAStartup
ioctlsocket
gethostbyname
send
recv
accept
shlwapi
SHDeleteKeyA
wininet
InternetOpenA
InternetOpenUrlA
HttpQueryInfoA
InternetReadFile
InternetCloseHandle
avicap32
capCreateCaptureWindowA
capGetDriverDescriptionA
msvcrt
_CxxThrowException
__CxxFrameHandler
fopen
fwrite
fclose
realloc
_ftol
??2@YAPAXI@Z
??3@YAXPAX@Z
sprintf
strtok
free
malloc
atol
_stricmp
??1type_info@@UAE@XZ
__dllonexit
_onexit
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
printf
_controlfp
Sections
.text Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ