Static task
static1
Behavioral task
behavioral1
Sample
cced4dd6835d0c4247160359bd4efd22141fa0b6f5f39fcbd531d06e30fa5228.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
cced4dd6835d0c4247160359bd4efd22141fa0b6f5f39fcbd531d06e30fa5228.exe
Resource
win10v2004-20230824-en
General
-
Target
cced4dd6835d0c4247160359bd4efd22141fa0b6f5f39fcbd531d06e30fa5228
-
Size
2.1MB
-
MD5
4d40fbfb1f63bf8a74ef209188adb91b
-
SHA1
5d364cdbcc4f776f115d909dda0f14d0eff64c58
-
SHA256
cced4dd6835d0c4247160359bd4efd22141fa0b6f5f39fcbd531d06e30fa5228
-
SHA512
f0dd341090528002a2c232e391e70e37e31e909cbefa92c9b30bf26da7991fdff89b2ed0c1ce10b5eec6527129001fea95e17dba99351ea10470aa5d6847d4dd
-
SSDEEP
49152:RggggM3woL+tONHK+XtndAwVJbYd1ZvL2KP/hRvuRy2lzq:gwnOZPdiwVJcoghJh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cced4dd6835d0c4247160359bd4efd22141fa0b6f5f39fcbd531d06e30fa5228
Files
-
cced4dd6835d0c4247160359bd4efd22141fa0b6f5f39fcbd531d06e30fa5228.exe windows x86
33f39dc0398ed7eed697e1c1781d6676
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadFile
CreateDirectoryW
CreateFileA
GetCurrentProcess
WriteFile
CreateFileW
OpenProcess
FindResourceExW
GetLogicalDriveStringsW
GetEnvironmentVariableW
SetEvent
ResetEvent
CreateEventW
TerminateProcess
DeviceIoControl
GetSystemDirectoryA
VirtualAlloc
GetFileSize
VirtualProtect
SetLastError
LoadLibraryA
IsBadReadPtr
IsDebuggerPresent
OutputDebugStringW
ReadConsoleA
SetConsoleMode
SwitchToFiber
DeleteFiber
CreateFiber
GlobalMemoryStatus
ConvertFiberToThread
GetVersionExW
GetModuleHandleW
FormatMessageW
LocalFree
LocalAlloc
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
MoveFileW
VirtualQuery
GetModuleFileNameA
LoadLibraryW
GetProcAddress
FreeLibrary
DeleteFileW
WaitForMultipleObjects
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
VerifyVersionInfoW
MoveFileExW
FindNextFileW
FindFirstFileW
GetSystemDirectoryW
GetNativeSystemInfo
GetSystemTime
FindClose
VerSetConditionMask
GetCurrentProcessId
WideCharToMultiByte
MultiByteToWideChar
GetTickCount
Sleep
GetCurrentThreadId
FindResourceW
SizeofResource
LoadResource
ConvertThreadToFiber
SystemTimeToFileTime
LockResource
GetCommandLineW
CreateMutexW
CloseHandle
WaitForSingleObject
ReleaseMutex
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
GetModuleFileNameW
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetLastError
RaiseException
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
IsValidCodePage
FindFirstFileExW
GetFullPathNameW
GetCurrentDirectoryW
HeapAlloc
HeapDestroy
VirtualFree
DecodePointer
TryEnterCriticalSection
GetStringTypeW
QueryPerformanceCounter
QueryPerformanceFrequency
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
EncodePointer
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
SleepEx
CompareFileTime
GetEnvironmentVariableA
GetFileType
GetStdHandle
PeekNamedPipe
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetStartupInfoW
InitializeSListHead
SignalObjectAndWait
CreateThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
GetCurrentThread
GetThreadTimes
FreeLibraryAndExitThread
GetModuleHandleA
LoadLibraryExW
DuplicateHandle
ReleaseSemaphore
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
CreateTimerQueue
RtlUnwind
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
SetFilePointerEx
ExitThread
GetModuleHandleExW
GetFileAttributesExW
GetDriveTypeW
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
ExitProcess
GetACP
ReadConsoleW
GetDateFormatW
GetTimeFormatW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
SetStdHandle
SetEndOfFile
FlushFileBuffers
WriteConsoleW
SetConsoleCtrlHandler
user32
GetProcessWindowStation
GetUserObjectInformationW
MessageBoxW
DefWindowProcW
advapi32
CryptDestroyKey
CryptSetHashParam
CryptGetProvParam
CryptGetUserKey
CryptExportKey
CryptDecrypt
CryptCreateHash
CryptDestroyHash
CryptSignHashW
CryptEnumProvidersW
CryptGenRandom
RegSetValueExW
RegCloseKey
RegCreateKeyExW
RegQueryValueExW
GetUserNameW
CryptReleaseContext
CryptAcquireContextW
ReportEventW
RegisterEventSourceW
DeregisterEventSource
AllocateAndInitializeSid
FreeSid
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
SetEntriesInAclW
RegOpenKeyExW
LookupAccountSidW
GetTokenInformation
OpenProcessToken
ole32
CoUninitialize
CoInitialize
shell32
CommandLineToArgvW
SHGetFolderPathW
shlwapi
PathRemoveFileSpecW
PathFindFileNameW
PathFileExistsW
SHDeleteKeyW
PathCombineW
urlmon
ObtainUserAgentString
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
psapi
EnumProcesses
GetProcessImageFileNameW
crypt32
CertGetCertificateContextProperty
CertDuplicateCertificateContext
CertFindCertificateInStore
CertOpenStore
CertCloseStore
CertOpenSystemStoreW
CertGetIntendedKeyUsage
CertGetEnhancedKeyUsage
CertFreeCertificateContext
CertEnumCertificatesInStore
ws2_32
gethostname
sendto
recvfrom
WSAEventSelect
WSAEnumNetworkEvents
WSACreateEvent
WSACloseEvent
getnameinfo
accept
WSACleanup
WSAStartup
WSAIoctl
WSASetLastError
socket
setsockopt
ntohs
htons
getsockopt
getsockname
getpeername
connect
bind
WSAGetLastError
send
recv
closesocket
freeaddrinfo
getaddrinfo
select
__WSAFDIsSet
ioctlsocket
listen
htonl
shutdown
wldap32
ord301
ord147
ord133
ord79
ord142
ord167
ord127
ord27
ord145
ord219
ord46
ord14
ord216
ord208
ord41
ord117
ord26
Sections
.text Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 478KB - Virtual size: 477KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 42KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 77KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ