Static task
static1
Behavioral task
behavioral1
Sample
cdfcc1795ef632b87d2419231da7d290f524156bc9ca0ee8050e8d9cf468a966.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
cdfcc1795ef632b87d2419231da7d290f524156bc9ca0ee8050e8d9cf468a966.exe
Resource
win10v2004-20230915-en
General
-
Target
cdfcc1795ef632b87d2419231da7d290f524156bc9ca0ee8050e8d9cf468a966
-
Size
2.1MB
-
MD5
7cc827f417ed1b0f94867cb5f8d0832f
-
SHA1
409f94040a8ea6050a39c222d385d30bb5708ef8
-
SHA256
cdfcc1795ef632b87d2419231da7d290f524156bc9ca0ee8050e8d9cf468a966
-
SHA512
8d8d1d28d176697ef3c996d1ecd7e53ab5592f66260ddafa4cf778505714449b64e42974e1eeff1dd87ad5bff7c6635817a3242dd1133be42726bf94e99a7f2b
-
SSDEEP
49152:CamxCtU+WVenEtCp6KyuwlC79+bbeEWs77BCTsX+TYnV:wx3sn6q6KyqE19f/SYV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cdfcc1795ef632b87d2419231da7d290f524156bc9ca0ee8050e8d9cf468a966
Files
-
cdfcc1795ef632b87d2419231da7d290f524156bc9ca0ee8050e8d9cf468a966.exe windows:5 windows x86
ef22939fe53da4f0b3f5f815ff6986a4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_REMOVABLE_RUN_FROM_SWAP
IMAGE_FILE_NET_RUN_FROM_SWAP
Imports
advapi32
InitiateSystemShutdownA
GetLengthSid
GetTokenInformation
OpenProcessToken
AllocateAndInitializeSid
CryptReleaseContext
CryptGenRandom
CryptAcquireContextA
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
InitializeSecurityDescriptor
kernel32
SetFilePointer
FormatMessageA
LeaveCriticalSection
RemoveDirectoryA
GetLastError
DeleteFileA
MoveFileExA
EnterCriticalSection
TerminateProcess
SetEvent
Sleep
SetEnvironmentVariableA
GetEnvironmentVariableA
WideCharToMultiByte
HeapAlloc
ReadFile
CreateFileA
ExitProcess
DeleteCriticalSection
FreeLibrary
FlushFileBuffers
GetSystemDirectoryA
GetVersionExA
GetProcAddress
LoadLibraryA
WaitForSingleObject
OpenEventA
WriteFile
GetCurrentProcess
CreateDirectoryA
GetFileAttributesA
SetFileTime
LocalFileTimeToFileTime
CloseHandle
GetExitCodeProcess
CreateProcessA
GetCurrentDirectoryA
SystemTimeToFileTime
GetSystemTime
GetDiskFreeSpaceA
QueryDosDeviceA
GetDriveTypeA
CreateThread
CreateEventA
GetCommandLineA
GetModuleFileNameA
GetProcessHeap
InitializeCriticalSectionAndSpinCount
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStdHandle
VirtualFree
HeapReAlloc
GetModuleHandleA
GetLocaleInfoA
GetCPInfo
SetStdHandle
RtlUnwind
GetStringTypeA
GetStringTypeW
GetACP
GetOEMCP
HeapFree
DosDateTimeToFileTime
user32
SendDlgItemMessageA
DialogBoxParamA
MessageBoxA
SetParent
ShowWindow
SendMessageA
LoadStringA
EndDialog
ntdll
NtShutdownSystem
NtOpenProcessToken
NtClose
NtAdjustPrivilegesToken
comctl32
ord17
shell32
SHBrowseForFolderA
SHGetPathFromIDListA
Sections
.text Size: 111KB - Virtual size: 111KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 128.1MB - Virtual size: 128.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ