Static task
static1
Behavioral task
behavioral1
Sample
1cc404bfb1e4e93fb6a1216d6670e878.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1cc404bfb1e4e93fb6a1216d6670e878.exe
Resource
win10v2004-20231215-en
General
-
Target
1cc404bfb1e4e93fb6a1216d6670e878
-
Size
196KB
-
MD5
1cc404bfb1e4e93fb6a1216d6670e878
-
SHA1
ab1c017b3f75ce13e47e3f53fa9e705609ee0cf0
-
SHA256
1198737172b45566f1507a4a96810e9a4c7d5ca6ff27d911272db054a196823a
-
SHA512
d0c76c6f0cda19125f5a20e1c58b3dd6cb2bdeca558b416c683359728be20b56e3b57457e675aa286a575c87e5e65c6fe2c08f4302aeb99c18dcd3be57575121
-
SSDEEP
3072:HvF/dksBFutwBnL5XZ58Ylf6+2NzcJaQOMpJq7JFMmxgwo:HvF/dk2hlXZ58YlfmiEMm1xvo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1cc404bfb1e4e93fb6a1216d6670e878
Files
-
1cc404bfb1e4e93fb6a1216d6670e878.exe windows:5 windows x86 arch:x86
6b53fd1ca59a3a16ba6db6a38ec3e96a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
wsprintfW
SendMessageA
SetWindowTextA
PostQuitMessage
GetDlgCtrlID
ReleaseDC
LoadCursorA
RegisterClassExA
GetWindowLongA
ShowWindow
SetWindowLongA
CreateWindowExA
GetDC
CopyImage
PostMessageA
GetSystemMetrics
SetWindowPos
GetMessageA
TranslateMessage
DefWindowProcA
DispatchMessageA
gdi32
CreateFontW
GetStockObject
SetTextColor
SetBkColor
CreateSolidBrush
GetDeviceCaps
ole32
CoInitializeSecurity
CoInitializeEx
CreateStreamOnHGlobal
CoCreateInstance
CoUninitialize
kernel32
SetEnvironmentVariableA
CompareStringW
LoadLibraryW
WriteConsoleW
HeapSize
SetStdHandle
LocalFree
FlushFileBuffers
UnhandledExceptionFilter
GetStringTypeW
Sleep
WaitForSingleObject
GetLastError
CreateThread
GetModuleHandleA
HeapAlloc
GetProcessHeap
SetCurrentDirectoryA
GetProcAddress
HeapReAlloc
WriteFile
CloseHandle
CreateFileA
GetTempFileNameW
WaitForMultipleObjects
GetModuleHandleW
GetTempFileNameA
ExpandEnvironmentStringsA
GetVersionExA
GetCurrentProcess
GlobalUnlock
GlobalLock
GlobalAlloc
SizeofResource
LockResource
LoadResource
FindResourceA
VirtualFree
VirtualAlloc
ReadFile
SetFilePointer
HeapFree
CreateFileW
GetModuleFileNameW
GetVolumeInformationW
lstrcpynW
GetWindowsDirectoryW
InterlockedDecrement
SwitchToThread
InterlockedIncrement
GetCommandLineA
HeapSetInformation
GetStartupInfoW
EnterCriticalSection
LeaveCriticalSection
GetSystemTimeAsFileTime
GetCurrentProcessId
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
DecodePointer
EncodePointer
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
RaiseException
ExitProcess
GetStdHandle
HeapCreate
WideCharToMultiByte
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
RtlUnwind
GetConsoleCP
GetConsoleMode
LCMapStringW
MultiByteToWideChar
winhttp
WinHttpQueryDataAvailable
WinHttpReadData
WinHttpSendRequest
WinHttpReceiveResponse
WinHttpOpen
WinHttpCloseHandle
WinHttpOpenRequest
WinHttpConnect
oleaut32
VariantClear
SysAllocString
SysFreeString
OleLoadPicture
VariantInit
advapi32
OpenSCManagerA
RegOpenKeyExA
CloseServiceHandle
OpenServiceW
RegCloseKey
iphlpapi
GetAdaptersInfo
Sections
.text Size: 113KB - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ