Static task
static1
Behavioral task
behavioral1
Sample
ddc8ae592e5b3eb18b1d89538968b94fa22ed2663c36c8a97da8913adff5cf03.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
ddc8ae592e5b3eb18b1d89538968b94fa22ed2663c36c8a97da8913adff5cf03.exe
Resource
win10v2004-20231023-en
General
-
Target
ddc8ae592e5b3eb18b1d89538968b94fa22ed2663c36c8a97da8913adff5cf03
-
Size
2.5MB
-
MD5
929df3031f1e2895310d006f7cc87a1f
-
SHA1
eed5182dc30eb3166bbd2f0c30cbef2a07ed99fa
-
SHA256
ddc8ae592e5b3eb18b1d89538968b94fa22ed2663c36c8a97da8913adff5cf03
-
SHA512
2ab9e83662281050868a5f375e18748d2f8af0ebc2649f0be03309ad57bc84f47fda9b38531cabd3b042ee546e363d5adaa841c9c66cbcf76b873ed5cd983086
-
SSDEEP
49152:dZp8l1PCBemMQ2HUQnxM8y+Z14m/Mv3PMTBXHlwyLbifiCDra2M:jp8lUe+wZxM44m/U39y/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ddc8ae592e5b3eb18b1d89538968b94fa22ed2663c36c8a97da8913adff5cf03
Files
-
ddc8ae592e5b3eb18b1d89538968b94fa22ed2663c36c8a97da8913adff5cf03.exe windows:5 windows x86
6e2d914db73a0b44187069073cab3684
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedCompareExchange
VirtualQuery
DeleteFileW
GetTickCount
MoveFileW
GetVersionExW
LoadLibraryW
GetProcAddress
FreeLibrary
WriteFile
SetFilePointer
CreateFileW
GetCurrentThreadId
GetLocalTime
HeapFree
OpenProcess
HeapAlloc
LocalFree
GetProcessHeap
Thread32Next
Thread32First
SuspendThread
ResumeThread
InterlockedExchange
OpenThread
InitializeCriticalSectionAndSpinCount
lstrlenW
ReadFile
SetEndOfFile
GetFileSize
GetACP
GlobalMemoryStatusEx
SetLastError
InterlockedExchangeAdd
GetCurrentProcess
ExpandEnvironmentStringsW
GetPrivateProfileStringW
GetModuleHandleW
GetFileAttributesW
SetStdHandle
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindFirstFileExW
WaitForSingleObject
MapViewOfFile
CreateFileMappingW
SetEvent
CreateEventW
UnmapViewOfFile
WaitForMultipleObjects
OpenMutexW
Sleep
GetCurrentProcessId
GetModuleFileNameW
CloseHandle
CreateMutexW
MoveFileExW
GetLastError
WriteConsoleW
CreateToolhelp32Snapshot
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
SetFilePointerEx
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
FindFirstFileW
GetLongPathNameW
GetFileAttributesExW
SearchPathW
GetEnvironmentVariableW
LockResource
GetSystemInfo
LoadResource
FindResourceW
lstrcmpiW
QueryDosDeviceW
CreateProcessW
GetExitCodeProcess
TerminateProcess
ResetEvent
MultiByteToWideChar
WideCharToMultiByte
ReleaseMutex
TryEnterCriticalSection
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
SetFileTime
GetFileTime
LoadLibraryExW
FindNextFileW
FindClose
FileTimeToSystemTime
SystemTimeToFileTime
GetSystemTime
GetComputerNameExW
RaiseException
DecodePointer
CreateDirectoryW
GetFullPathNameW
RemoveDirectoryW
GetTempPathW
SetFileAttributesW
GetCurrentDirectoryW
GetWindowsDirectoryW
CopyFileW
GetTempFileNameW
GetDiskFreeSpaceW
GetLogicalDriveStringsW
FormatMessageW
DeviceIoControl
LoadLibraryA
GetFileSizeEx
GetStringTypeW
EncodePointer
IsProcessorFeaturePresent
GetModuleHandleExW
GetCPInfo
QueryPerformanceCounter
QueryPerformanceFrequency
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
DuplicateHandle
WaitForSingleObjectEx
GetCurrentThread
CompareStringW
LCMapStringW
GetLocaleInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStartupInfoW
InitializeSListHead
RtlCaptureContext
ReleaseSemaphore
GetProcessId
TerminateThread
CreateThread
CreateSemaphoreW
VirtualQueryEx
SetNamedPipeHandleState
TransactNamedPipe
WaitNamedPipeW
AreFileApisANSI
HeapCreate
OutputDebugStringA
LockFile
GetFullPathNameA
UnlockFileEx
HeapValidate
HeapSize
GetTempPathA
GetDiskFreeSpaceA
GetFileAttributesA
OutputDebugStringW
FlushViewOfFile
CreateFileA
GetVersionExA
DeleteFileA
HeapReAlloc
HeapCompact
HeapDestroy
UnlockFile
CreateFileMappingA
LockFileEx
FormatMessageA
FlushFileBuffers
GetStdHandle
GetFileType
CreateTimerQueue
SignalObjectAndWait
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
GetThreadTimes
FreeLibraryAndExitThread
GetModuleHandleA
VirtualAlloc
VirtualProtect
VirtualFree
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
RtlUnwind
ExitThread
ExitProcess
user32
wsprintfW
GetWindowThreadProcessId
FindWindowExW
IsWindowVisible
SendMessageW
ShowWindow
IsWindow
SetForegroundWindow
IsIconic
advapi32
RegCreateKeyExW
shell32
SHGetSpecialFolderPathW
SHGetFolderPathW
Sections
.text Size: 1.9MB - Virtual size: 1.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 325KB - Virtual size: 324KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 129KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 78KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ