Static task
static1
Behavioral task
behavioral1
Sample
cc76a80355c83d49e651429757f8609e7f404712f4bfafcf74a5441d60f6c4f6.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
cc76a80355c83d49e651429757f8609e7f404712f4bfafcf74a5441d60f6c4f6.exe
Resource
win10v2004-20230915-en
General
-
Target
cc76a80355c83d49e651429757f8609e7f404712f4bfafcf74a5441d60f6c4f6
-
Size
2.7MB
-
MD5
f3c92efffae09592e5c7a481d9b3e11d
-
SHA1
9865de66d03fe5eb11e18027cff1e0a0087a6ef1
-
SHA256
cc76a80355c83d49e651429757f8609e7f404712f4bfafcf74a5441d60f6c4f6
-
SHA512
2f7e3ccb9b5745fb87a49e3ac816029205a4a43743eab921de20d212b99102829988601034397ff8d47787b448f3580d6e69f60e1d695190cc2ec1aebb07927b
-
SSDEEP
49152:+MqpsF+srX0mUwW4d6C5Pd/9tslRYW8UQQTicpTq7lnO:+Mq6F+srT2Gt5DcdQQT9e
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cc76a80355c83d49e651429757f8609e7f404712f4bfafcf74a5441d60f6c4f6
Files
-
cc76a80355c83d49e651429757f8609e7f404712f4bfafcf74a5441d60f6c4f6.exe windows:6 windows x86
017011d2ebb5f2ac76d5392095a4f019
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedDecrement
InitializeCriticalSectionAndSpinCount
GlobalAlloc
GlobalLock
GlobalUnlock
InitializeCriticalSection
WaitForMultipleObjects
DeleteCriticalSection
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
FormatMessageA
GetModuleHandleA
SetEndOfFile
OutputDebugStringA
GetModuleFileNameA
GetModuleHandleExA
OutputDebugStringW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
IsDebuggerPresent
DebugBreak
WriteConsoleW
SetStdHandle
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
ReleaseSemaphore
VirtualProtect
VirtualFree
VirtualAlloc
GetVersionExW
FreeLibraryAndExitThread
FreeLibrary
GetThreadTimes
InterlockedIncrement
SetFileTime
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
GetConsoleCP
ReadConsoleW
GetConsoleMode
GetStdHandle
GetOEMCP
IsValidCodePage
HeapSize
GetModuleHandleExW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
SwitchToThread
SignalObjectAndWait
WaitForSingleObjectEx
SetEvent
CreateTimerQueue
LoadLibraryExW
ExitThread
CreateSemaphoreW
GetStartupInfoW
CreateEventW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
GetTimeZoneInformation
MoveFileExW
AreFileApisANSI
IsProcessorFeaturePresent
GetCommandLineW
HeapReAlloc
RtlUnwind
RaiseException
GetSystemTimeAsFileTime
DecodePointer
EncodePointer
GetStringTypeW
GetCurrentThread
GetLocalTime
DosDateTimeToFileTime
SystemTimeToFileTime
FlushFileBuffers
SetFilePointer
GetFileType
GetCurrentProcess
MulDiv
ReadFile
GetFileSize
CreateFileW
WriteFile
ExitProcess
FreeResource
GetCurrentDirectoryW
LoadLibraryW
GetTickCount
GetACP
CreateMutexW
FindResourceW
SizeofResource
LockResource
LoadResource
CreateThread
Sleep
GetProcessHeap
HeapFree
HeapAlloc
SetLastError
GetFileAttributesW
DeleteFileW
CreateDirectoryW
WideCharToMultiByte
MultiByteToWideChar
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
GetUserDefaultUILanguage
GetPrivateProfileSectionW
GetPrivateProfileStringW
LoadLibraryA
lstrcpyW
GetDiskFreeSpaceExW
lstrcmpW
DuplicateHandle
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
OpenProcess
CreateProcessW
ResumeThread
TerminateProcess
WaitForSingleObject
GetLastError
CloseHandle
SetFilePointerEx
SetEnvironmentVariableA
user32
FindWindowW
TranslateMessage
DispatchMessageW
SendMessageW
PostMessageW
DefWindowProcW
CallWindowProcW
RegisterClassW
RegisterClassExW
GetClassInfoExW
CreateWindowExW
IsWindow
SetWindowPos
IsIconic
SetFocus
EnableWindow
GetSystemMetrics
GetMenu
SetPropW
GetPropW
GetClientRect
GetWindowRect
AdjustWindowRectEx
GetWindowLongW
SetWindowLongW
GetParent
GetWindow
LoadCursorW
LoadImageW
MonitorFromWindow
GetMonitorInfoW
wvsprintfW
SetCursor
UnionRect
OffsetRect
DestroyWindow
CharNextW
GetActiveWindow
GetFocus
GetKeyState
SetCapture
ReleaseCapture
GetDC
ReleaseDC
BeginPaint
wsprintfW
PostQuitMessage
MessageBoxA
GetGUIThreadInfo
InvalidateRgn
EndPaint
GetUpdateRect
InvalidateRect
GetCursorPos
ScreenToClient
MapWindowPoints
IntersectRect
IsRectEmpty
PtInRect
IsZoomed
SetWindowRgn
SetWindowTextW
GetWindowTextW
GetWindowTextLengthW
GetCaretBlinkTime
GetCaretPos
CharPrevW
DrawTextW
FillRect
SetRect
CreateCaret
HideCaret
ShowCaret
SetCaretPos
ClientToScreen
GetSysColor
MoveWindow
CreateAcceleratorTableW
GetMessageW
SetForegroundWindow
IsWindowVisible
SetTimer
KillTimer
MessageBoxW
ShowWindow
gdi32
GetDeviceCaps
GdiFlush
ExtTextOutW
TextOutW
MoveToEx
CreateDIBSection
SetStretchBltMode
StretchBlt
SetBkColor
ExtSelectClipRgn
SelectClipRgn
RoundRect
LineTo
GetTextExtentPoint32W
GetClipBox
GetCharABCWidthsW
CreateRectRgnIndirect
CreatePenIndirect
CombineRgn
SetTextColor
SetBkMode
CreateSolidBrush
CreatePatternBrush
CreateRoundRectRgn
SetWindowOrgEx
GetObjectW
GetTextMetricsW
SelectObject
SaveDC
RestoreDC
Rectangle
GetStockObject
DeleteObject
DeleteDC
CreatePen
CreateFontIndirectW
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
GetObjectA
shell32
ShellExecuteExW
SHCreateDirectoryExW
SHGetSpecialFolderLocation
ord165
SHGetPathFromIDListW
ShellExecuteW
SHBrowseForFolderW
ole32
CoUninitialize
CLSIDFromString
CLSIDFromProgID
OleLockRunning
CreateStreamOnHGlobal
CoCreateGuid
CoInitialize
CoCreateInstance
CoTaskMemFree
oleaut32
VariantClear
VariantInit
SysFreeString
SysAllocString
advapi32
RegOpenKeyExW
RegQueryValueExW
RegCreateKeyExW
RegSetValueExW
RegCloseKey
gdiplus
GdipAlloc
GdipDeleteBrush
GdipCloneBrush
GdiplusShutdown
GdiplusStartup
GdipGetPropertyItem
GdipGetPropertyItemSize
GdipImageSelectActiveFrame
GdipImageGetFrameCount
GdipImageGetFrameDimensionsList
GdipImageGetFrameDimensionsCount
GdipGetImageHeight
GdipGetImageWidth
GdipLoadImageFromStreamICM
GdipLoadImageFromStream
GdipSetStringFormatLineAlign
GdipSetStringFormatAlign
GdipDeleteStringFormat
GdipCreateStringFormat
GdipDrawString
GdipGetFamily
GdipDeleteFont
GdipCreateFontFromLogfontA
GdipCreateFontFromDC
GdipDeleteFontFamily
GdipDrawImageRectI
GdipDrawImage
GdipGraphicsClear
GdipSetInterpolationMode
GdipSetTextRenderingHint
GdipSetPixelOffsetMode
GdipSetSmoothingMode
GdipSetCompositingQuality
GdipDeleteGraphics
GdipCreateFromHDC
GdipCreateBitmapFromScan0
GdipGetImageGraphicsContext
GdipDisposeImage
GdipCloneImage
GdipCreateLineBrushI
GdipFree
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
comctl32
ImageList_Create
ord17
_TrackMouseEvent
imm32
ImmGetContext
ImmSetCompositionFontW
ImmSetCompositionWindow
ImmReleaseContext
wininet
InternetGetConnectedState
InternetQueryOptionW
InternetSetOptionW
InternetCloseHandle
InternetOpenW
InternetConnectW
HttpOpenRequestW
HttpAddRequestHeadersW
HttpSendRequestW
HttpQueryInfoW
HttpQueryInfoA
HttpSendRequestA
HttpAddRequestHeadersA
HttpOpenRequestA
InternetConnectA
InternetReadFile
winhttp
WinHttpCloseHandle
WinHttpOpen
WinHttpQueryDataAvailable
WinHttpConnect
WinHttpSetOption
WinHttpOpenRequest
WinHttpSendRequest
WinHttpReceiveResponse
WinHttpQueryHeaders
WinHttpAddRequestHeaders
WinHttpReadData
WinHttpSetTimeouts
shlwapi
PathFileExistsW
PathFindFileNameW
PathFindFileNameA
StrToIntW
ws2_32
gethostbyname
socket
setsockopt
htons
inet_addr
connect
send
recv
closesocket
Sections
.text Size: 741KB - Virtual size: 741KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 168KB - Virtual size: 167KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 17KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.8MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ