Static task
static1
Behavioral task
behavioral1
Sample
2cc1728b1f8d1d3f1d4cd3fcc3593c14.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2cc1728b1f8d1d3f1d4cd3fcc3593c14.exe
Resource
win10v2004-20231215-en
General
-
Target
2cc1728b1f8d1d3f1d4cd3fcc3593c14
-
Size
192KB
-
MD5
2cc1728b1f8d1d3f1d4cd3fcc3593c14
-
SHA1
d401160ae178781289b8431bdff69ea02d9f9ff2
-
SHA256
07b227cf5b91c6401667efa707e8a89f1a3374769aa9b74f939c271e1271c1d8
-
SHA512
9399b773f438a4ff83a4df51bbe3728a6aff8debd0e79dfa62d7bf82dcc44b293231304b780aa9a8726ccbd4d97a20eb38f2493fe9cd772223efcb0751c837c4
-
SSDEEP
3072:JPOKWROAEATTiczEJToGGhKW9o+SALvH/n2w52YGLlY:JPOKWRPTDEJMhKJaf2uyLlY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2cc1728b1f8d1d3f1d4cd3fcc3593c14
Files
-
2cc1728b1f8d1d3f1d4cd3fcc3593c14.exe windows:4 windows
3ad350f14c2e450686dbd3fbcbe807a6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThread
SetPriorityClass
GetCurrentProcess
lstrcatA
lstrcpyA
GetEnvironmentVariableA
GetShortPathNameA
GetModuleFileNameA
CreateMutexA
SetThreadPriority
GetLastError
SetFileAttributesA
CopyFileA
GetModuleHandleA
GetTickCount
LCMapStringW
LCMapStringA
SetEnvironmentVariableA
CompareStringW
ResumeThread
GetSystemDirectoryA
CreateProcessA
OpenProcess
WaitForSingleObject
GetSystemInfo
LoadLibraryA
GetProcAddress
GlobalMemoryStatus
CreateThread
CloseHandle
ExitThread
lstrlenA
Sleep
CompareStringA
GetFileAttributesA
SetConsoleCtrlHandler
GetOEMCP
GetACP
GetCPInfo
FlushFileBuffers
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
RaiseException
SetFilePointer
WriteFile
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
IsBadWritePtr
GetTimeZoneInformation
GetSystemTime
GetLocalTime
RtlUnwind
ExitProcess
TerminateProcess
DuplicateHandle
HeapFree
HeapAlloc
GetStartupInfoA
GetCommandLineA
GetVersion
SetHandleCount
GetStdHandle
GetFileType
SetStdHandle
CreatePipe
GetExitCodeProcess
HeapReAlloc
HeapSize
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
user32
wsprintfA
comdlg32
GetFileTitleA
advapi32
CreateServiceA
OpenServiceA
StartServiceA
RegSetValueExA
CloseServiceHandle
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
SetServiceStatus
RegOpenKeyExA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
OpenSCManagerA
ws2_32
WSAGetLastError
gethostname
select
__WSAFDIsSet
recv
WSAIoctl
connect
send
socket
WSAStartup
inet_ntoa
setsockopt
sendto
closesocket
WSACleanup
ntohl
htons
inet_addr
gethostbyname
WSASocketA
iphlpapi
GetIfTable
Sections
.text Size: 92KB - Virtual size: 89KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 84KB - Virtual size: 9.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE