Static task
static1
Behavioral task
behavioral1
Sample
0ccd45a8011894b123e644bac47df806.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0ccd45a8011894b123e644bac47df806.exe
Resource
win10v2004-20231215-en
General
-
Target
0ccd45a8011894b123e644bac47df806
-
Size
788KB
-
MD5
0ccd45a8011894b123e644bac47df806
-
SHA1
133ef0be3f1b9375ac4e1b395a8e256a8f1c166c
-
SHA256
5f001310e2778dcb690f701c78b9f32c5f51f9bc242751f02a0d91949e5c42d9
-
SHA512
2b4348b7dc689ad7fb9577c20f0cf212e4f86d4cd0655900ffd1ff0423b0a1335702f653259fd595704817d128eec6b644e7661b321101c153e5f7028635940f
-
SSDEEP
12288:Xv/7VwsL/+hRKfQzgmhUPHulzfy94ThV/fdfTHxwgrCeyxYicLp4cN:XvDVwaoRdzgwUPHca94NBfxRwXec2p7N
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0ccd45a8011894b123e644bac47df806
Files
-
0ccd45a8011894b123e644bac47df806.exe windows:4 windows x86 arch:x86
4e3858a19bdb2fbcd2cb673ec7252c71
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ord17
kernel32
DosDateTimeToFileTime
GlobalLock
GlobalFree
GlobalUnlock
LocalFileTimeToFileTime
GlobalHandle
GetTempFileNameA
GetTempPathA
lstrcpyA
lstrcpynA
lstrcmpA
ReadFile
WriteFile
SetFilePointer
FlushFileBuffers
DeleteFileA
GetCurrentThreadId
GetCommandLineA
HeapAlloc
SetFileTime
FreeLibrary
CloseHandle
GetModuleFileNameA
MultiByteToWideChar
InitializeCriticalSection
HeapDestroy
DeleteCriticalSection
LeaveCriticalSection
CreateFileA
FlushInstructionCache
GetCurrentProcess
GetProcAddress
WaitForSingleObject
CreateProcessA
GetModuleHandleA
GetStartupInfoA
ExitProcess
HeapReAlloc
HeapFree
GlobalAlloc
GetLastError
SetFileAttributesA
lstrlenA
FormatMessageA
LocalFree
LCMapStringW
BeginUpdateResourceA
EnterCriticalSection
UpdateResourceA
EndUpdateResourceA
LoadLibraryA
FindResourceA
SizeofResource
LoadResource
LockResource
FreeResource
HeapCreate
GetSystemInfo
lstrcatA
RaiseException
GetStringTypeW
GetStringTypeA
CreateDirectoryA
GetFileType
LCMapStringA
WideCharToMultiByte
IsBadCodePtr
IsBadWritePtr
IsBadReadPtr
SetUnhandledExceptionFilter
GetOEMCP
GetACP
GetCPInfo
HeapSize
TerminateProcess
RtlUnwind
SetStdHandle
SetEndOfFile
GetFileAttributesA
GetStdHandle
user32
CharNextA
CharPrevA
MessageBoxA
SendMessageA
SetCursor
LoadCursorA
SetDlgItemTextA
GetDlgItemTextA
DialogBoxParamA
GetActiveWindow
SetWindowLongA
ShowWindow
DispatchMessageA
TranslateMessage
PeekMessageA
PostMessageA
GetDlgItem
LoadStringA
EndDialog
comdlg32
GetOpenFileNameA
GetSaveFileNameA
advapi32
CryptCreateHash
CryptHashData
CryptEncrypt
CryptDeriveKey
CryptDestroyKey
CryptSetKeyParam
CryptGetHashParam
CryptDecrypt
RegEnumKeyA
RegOpenKeyA
RegCloseKey
CryptAcquireContextA
CryptReleaseContext
CryptDestroyHash
shell32
FindExecutableA
SHBrowseForFolderA
SHGetPathFromIDListA
SHGetMalloc
Sections
.text Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ