Static task
static1
Behavioral task
behavioral1
Sample
First Cut.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
First Cut.exe
Resource
win10v2004-20230703-en
General
-
Target
First Cut.exe
-
Size
11.1MB
-
MD5
017509f9fcde0b8465caacd0d0fd5c33
-
SHA1
895b8d7e13a1ee5bc500bbcb2992dd34f84bcdd9
-
SHA256
16258e909627ed14875195d6a77d14be821c3d62e53c3c5b5289e9cd0943bcde
-
SHA512
2dad5731ac157a0201a53f22564c5f4fabc14d843ad73bfee074cdc0be5ba2871cb9d214a9deaf8a8a5dc3cf41d941e813e2b1a3c0aff0b8e86704e9e84ba3cb
-
SSDEEP
196608:uHXAUnZI2AQp9jgq0/VB6S4Kd4fQ+AcoUvFF7GjWDamIv/IKHerc:tq6R4Kd4hLRvFuWDAvs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource First Cut.exe
Files
-
First Cut.exe.exe windows x86
Password: lmao
9cc08c7094d3d3d12f3890022fd01fb3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetConnectA
HttpOpenRequestA
HttpSendRequestA
InternetCanonicalizeUrlA
InternetCrackUrlA
InternetOpenA
HttpQueryInfoA
InternetReadFile
InternetCloseHandle
InternetGetConnectedState
d3dx9_43
D3DXGetPixelShaderProfile
D3DXCreateTextureFromFileW
D3DXGetImageInfoFromFileInMemory
D3DXCreateTextureFromFileInMemoryEx
D3DXGetVertexShaderProfile
D3DXCompileShader
dbghelp
SymFromAddr
SymInitialize
winmm
joyGetPosEx
joyGetDevCapsA
joyGetPos
mciSendStringA
mciGetErrorStringA
ws2_32
ntohs
htonl
htons
getpeername
__WSAFDIsSet
select
WSAGetLastError
closesocket
freeaddrinfo
sendto
connect
inet_addr
shutdown
WSAStartup
getsockopt
setsockopt
ioctlsocket
socket
bind
getaddrinfo
send
recvfrom
inet_ntoa
recv
accept
listen
gdiplus
GdiplusStartup
GdiplusShutdown
comctl32
InitCommonControlsEx
kernel32
GetTempPathA
FindFirstFileExW
SetFileAttributesW
GetFileAttributesExW
ReadFile
HeapWalk
HeapValidate
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
FindNextFileA
MoveFileExW
LoadLibraryExA
RaiseException
GetDriveTypeW
SetEnvironmentVariableW
SetEnvironmentVariableA
GetFileInformationByHandle
PeekNamedPipe
ReadConsoleW
GetTimeZoneInformation
SetFilePointer
FileTimeToLocalFileTime
FindFirstFileExA
lstrlenA
GlobalAlloc
GlobalLock
GlobalUnlock
SetPriorityClass
CreateDirectoryW
GetFileAttributesW
FindFirstFileW
RemoveDirectoryW
FindNextFileW
FindClose
CreateProcessW
GetExitCodeProcess
DeleteFileW
GetExitCodeThread
FormatMessageW
LocalFree
GetCurrentDirectoryW
GlobalMemoryStatusEx
GetSystemInfo
GetLocaleInfoW
GetUserDefaultLCID
GetVersionExW
SetEndOfFile
TlsSetValue
EncodePointer
DecodePointer
GetCommandLineA
GetLastError
HeapFree
InterlockedDecrement
ExitProcess
GetModuleHandleExW
GetProcAddress
AreFileApisANSI
MultiByteToWideChar
HeapSize
Sleep
IsProcessorFeaturePresent
SetLastError
InterlockedIncrement
GetCurrentThread
GetCurrentThreadId
GetStdHandle
WriteFile
GetModuleFileNameW
GetProcessHeap
GetFileType
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
InitOnceExecuteOnce
GetStartupInfoW
GetModuleFileNameA
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetTickCount64
GetEnvironmentStringsW
FreeEnvironmentStringsW
WideCharToMultiByte
UnhandledExceptionFilter
SetUnhandledExceptionFilter
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
GetCurrentProcess
TerminateProcess
GetModuleHandleW
IsDebuggerPresent
EnterCriticalSection
LeaveCriticalSection
InterlockedExchange
FreeLibrary
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
HeapAlloc
HeapReAlloc
RtlUnwind
OutputDebugStringW
LoadLibraryW
GetTimeFormatEx
GetDateFormatEx
CompareStringEx
GetLocaleInfoEx
GetUserDefaultLocaleName
LCMapStringEx
IsValidLocaleName
EnumSystemLocalesEx
GetStringTypeW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetStdHandle
SetFilePointerEx
WriteConsoleW
CloseHandle
CreateFileW
ExpandEnvironmentStringsW
MoveFileA
GetFullPathNameW
SetErrorMode
GetCommandLineW
GetCurrentProcessId
RtlCaptureStackBackTrace
GetTickCount
QueryPerformanceFrequency
WaitForSingleObject
SetWaitableTimer
CreateWaitableTimerW
TlsAlloc
SetThreadPriority
CreateThread
GetConsoleWindow
SetCurrentDirectoryA
GetCurrentDirectoryA
GetEnvironmentVariableW
user32
EmptyClipboard
SetClipboardData
OpenClipboard
GetClipboardData
GetFocus
IsClipboardFormatAvailable
SetWindowTextA
GetAsyncKeyState
keybd_event
DialogBoxParamW
SetDlgItemTextA
GetRawInputDeviceInfoA
GetRawInputDeviceList
EnumDisplayDevicesA
GetForegroundWindow
CloseClipboard
DrawTextW
MessageBoxA
PostMessageW
IsDialogMessageW
DispatchMessageW
TranslateMessage
PeekMessageW
SetFocus
GetActiveWindow
GetKeyState
SetCapture
ReleaseCapture
DefWindowProcW
GetWindowRect
GetClientRect
SetCursor
SendMessageW
CreateWindowExW
RegisterClassExW
LoadCursorW
LoadImageW
AdjustWindowRectEx
GetSystemMetrics
SetWindowPos
SetForegroundWindow
BringWindowToTop
ShowWindow
DestroyWindow
ReleaseDC
GetDC
MessageBoxW
wsprintfW
EnumDisplaySettingsW
ChangeDisplaySettingsW
GetCursorPos
SetCursorPos
SetWindowLongW
UpdateWindow
EnumDisplaySettingsExW
SetWindowTextW
MoveWindow
ClientToScreen
GetMonitorInfoW
MapWindowPoints
SetDlgItemTextW
GetDlgItemTextW
EndDialog
CreateDialogParamW
ScreenToClient
GetDlgItem
gdi32
SelectObject
GetDeviceCaps
comdlg32
GetOpenFileNameW
GetSaveFileNameW
advapi32
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
shell32
SHGetFolderPathW
ShellExecuteW
ole32
CoUninitialize
CoCreateInstance
CoInitialize
oleaut32
SysAllocString
SysFreeString
VariantClear
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
Sections
.text Size: 3.8MB - Virtual size: 3.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 893KB - Virtual size: 892KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6.1MB - Virtual size: 8.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.mydata Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 86KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 195KB - Virtual size: 194KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ