Static task
static1
Behavioral task
behavioral1
Sample
cc95a3c8fc443686d5bf83d0e196db861072e731c7445643cb192b89b47a47fb.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
cc95a3c8fc443686d5bf83d0e196db861072e731c7445643cb192b89b47a47fb.exe
Resource
win10v2004-20230915-en
General
-
Target
cc95a3c8fc443686d5bf83d0e196db861072e731c7445643cb192b89b47a47fb
-
Size
88KB
-
MD5
dfe29ea783955aefb53f1bff004e108f
-
SHA1
7afed4a72ed8b15109447ee40e7963a44d696dd9
-
SHA256
cc95a3c8fc443686d5bf83d0e196db861072e731c7445643cb192b89b47a47fb
-
SHA512
d7c308a193fa4337505423914baebfb53ad075e000ecbb1564f943ec74c208415536d732708e085f3559e493e904dd87a65a0e38c2256d75b1d72e4804f80133
-
SSDEEP
1536:0vCIazOz8+Kdj/tf+OZEtckaTP5nMBuONn+RfV43b/ZuzG1P3N2Uhys:0h4Oz8+KF/pstBaDqwONnct43bBl3N2U
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cc95a3c8fc443686d5bf83d0e196db861072e731c7445643cb192b89b47a47fb
Files
-
cc95a3c8fc443686d5bf83d0e196db861072e731c7445643cb192b89b47a47fb.exe windows:5 windows x64
790c998e78f5944dcb1cdc94c9cef5d9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
lulcontroldll
?GetInstance@CLulControl@@SAAEAV1@XZ
?ShowLulUI@CLulControl@@QEAA_NPEAVCWnd@@@Z
mfc100
ord11099
ord12808
ord10609
ord13700
ord1709
ord6823
ord11489
ord3477
ord3535
ord8182
ord12925
ord6806
ord12927
ord11107
ord11106
ord2116
ord4555
ord13393
ord11410
ord7213
ord7286
ord373
ord1872
ord1895
ord6425
ord9171
ord11791
ord776
ord1188
ord9724
ord10795
ord8202
ord3270
ord4608
ord5564
ord8001
ord8982
ord4920
ord10790
ord2753
ord2851
ord2852
ord3355
ord10747
ord2285
ord5046
ord12138
ord10366
ord5887
ord12926
ord6807
ord12928
ord2573
ord3842
ord10867
ord3849
ord4246
ord4213
ord4209
ord4243
ord4264
ord4222
ord4251
ord4260
ord4230
ord4234
ord4238
ord4226
ord4255
ord4218
ord1492
ord1485
ord1487
ord1481
ord1474
ord6868
ord5031
ord12284
ord2754
ord8026
ord9688
ord5973
ord7766
ord12920
ord10577
ord3275
ord10712
ord7931
ord13599
ord13598
ord13670
ord13687
ord13683
ord13685
ord13686
ord13684
ord2353
ord7057
ord2785
ord2788
ord12181
ord5319
ord2659
ord2877
ord2878
ord10054
ord9701
ord7833
ord10754
ord3934
ord7063
ord9145
ord10871
ord10840
ord11470
ord4458
ord4722
ord4892
ord8135
ord4700
ord4895
ord4461
ord4597
ord4445
ord6640
ord6641
ord6631
ord4595
ord7065
ord8977
ord8000
ord5871
ord926
ord5542
ord5596
ord3313
ord316
ord4124
ord1948
ord924
ord3479
ord12311
ord837
ord1863
ord6865
ord1266
ord876
ord6580
ord9095
ord1272
ord13109
ord13106
ord13111
ord13108
ord13110
ord13107
ord10875
ord3288
ord310
ord889
ord10877
ord10859
ord1274
ord2049
ord13605
msvcr100
_setmbcp
?_type_info_dtor_internal_method@type_info@@QEAAXXZ
__crt_debugger_hook
?terminate@@YAXXZ
__set_app_type
_fmode
_commode
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_cexit
_ismbblead
_exit
_XcptFilter
__getmainargs
_amsg_exit
_onexit
_lock
__dllonexit
_unlock
__C_specific_handler
__CxxFrameHandler3
kernel32
GetStartupInfoW
Sleep
DecodePointer
RtlCaptureContext
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
EncodePointer
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
user32
DrawIcon
GetClientRect
GetSystemMetrics
IsIconic
SendMessageA
LoadIconW
EnableWindow
comctl32
InitCommonControlsEx
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 504B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 69KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 792B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ