Static task
static1
Behavioral task
behavioral1
Sample
cdb4cc2a8640191935c8a962d96945805b17ae8ed1516893a55ec3977882901a.exe
Resource
win10v2004-20230220-en
General
-
Target
cdb4cc2a8640191935c8a962d96945805b17ae8ed1516893a55ec3977882901a
-
Size
368KB
-
MD5
094313b2fae250d4283291ce01db02d2
-
SHA1
88c05084a593c829f9e8ef9f14410c68a949a619
-
SHA256
cdb4cc2a8640191935c8a962d96945805b17ae8ed1516893a55ec3977882901a
-
SHA512
4ac8e7512394a93eb86cb5b2d0dfa0192ed972ec811d71979f74ac75284fae2e41455978026c54345fe29d6800f318b9f0d4510b94ff0ad7a918c85d01b56750
-
SSDEEP
6144:ZYJq+maojg7uJhBaeDrPgJAWLnIZ+BId38S5F/MWx+:/+YEG2eDrOAiV4lJMWo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource cdb4cc2a8640191935c8a962d96945805b17ae8ed1516893a55ec3977882901a
Files
-
cdb4cc2a8640191935c8a962d96945805b17ae8ed1516893a55ec3977882901a.exe windows x86
8e752cbc2a7c73137ae3765e2dd6f418
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetConsoleAliasA
WaitForSingleObject
SetComputerNameW
AddConsoleAliasW
GetComputerNameW
GetModuleHandleW
EnumCalendarInfoExW
GetConsoleAliasesA
GetNumberFormatA
GetConsoleTitleA
ReadConsoleW
GetWindowsDirectoryA
GetConsoleAliasExesW
EnumTimeFormatsW
CreateActCtxW
SetProcessPriorityBoost
FindResourceExA
GetCalendarInfoW
GetSystemWindowsDirectoryA
FindNextVolumeW
Beep
WriteConsoleW
GetConsoleFontSize
lstrlenW
GlobalUnlock
GetShortPathNameA
GetCPInfoExW
SetLastError
GetProcAddress
GetLongPathNameA
VirtualAlloc
HeapSize
ReadConsoleA
BeginUpdateResourceW
EnumSystemCodePagesW
SetThreadPriorityBoost
LoadLibraryA
InterlockedExchangeAdd
LocalAlloc
RemoveDirectoryW
QueryDosDeviceW
WriteProfileSectionW
AddAtomA
FindAtomA
EnumResourceTypesW
GetModuleFileNameA
GetOEMCP
SetConsoleCursorInfo
GetConsoleTitleW
WriteConsoleOutputAttribute
GetDiskFreeSpaceExW
WriteFileEx
DeleteTimerQueueTimer
SuspendThread
RaiseException
GetModuleHandleA
GetLocaleInfoA
SystemTimeToFileTime
lstrlenA
GetDefaultCommConfigW
IsBadHugeWritePtr
FindResourceA
MultiByteToWideChar
GetCommandLineA
GetStartupInfoA
HeapAlloc
GetLastError
HeapFree
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
Sleep
ExitProcess
GetCPInfo
GetACP
IsValidCodePage
SetUnhandledExceptionFilter
WriteFile
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
LeaveCriticalSection
EnterCriticalSection
HeapReAlloc
InitializeCriticalSectionAndSpinCount
RtlUnwind
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
user32
ToAsciiEx
ChangeMenuA
CharLowerBuffW
CreateAcceleratorTableW
GetWindowLongW
GetSysColorBrush
SetCaretPos
ModifyMenuA
IsCharAlphaNumericA
GetKeyNameTextA
gdi32
CreateHalftonePalette
GetCharABCWidthsW
GetCharWidthW
advapi32
BackupEventLogA
Sections
.text Size: 206KB - Virtual size: 206KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 154KB - Virtual size: 154KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ