Static task
static1
Behavioral task
behavioral1
Sample
cdc9f01c71fc1a5814760824ed73f5e4cca103d8418ae946ecf1f68cb800a8f5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
cdc9f01c71fc1a5814760824ed73f5e4cca103d8418ae946ecf1f68cb800a8f5.exe
Resource
win10v2004-20231215-en
General
-
Target
cdc9f01c71fc1a5814760824ed73f5e4cca103d8418ae946ecf1f68cb800a8f5
-
Size
1.4MB
-
MD5
d57c5dc032f2ad8ef18d07410f54772b
-
SHA1
2e1e57560b22521fa67fe7d446b8e4e7a4a22a34
-
SHA256
cdc9f01c71fc1a5814760824ed73f5e4cca103d8418ae946ecf1f68cb800a8f5
-
SHA512
13c92c81c0b93b222b907044f64919990a7c98771f3b918fde80e9e24b53cb263f3d6a4358acf876148e725a22ba6f825277faa5e7d8b9f923811ce8fdb9e0ed
-
SSDEEP
12288:ZSuC4yPlrmnHg0Eu3xYyYVM0aGIoRg35lBCgRxImiDf68PWsTUme9qnu8nuDFRS:cubydKnlGVMeg39iDy8PrTM9+ulS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cdc9f01c71fc1a5814760824ed73f5e4cca103d8418ae946ecf1f68cb800a8f5
Files
-
cdc9f01c71fc1a5814760824ed73f5e4cca103d8418ae946ecf1f68cb800a8f5.exe windows:5 windows x86 arch:x86
731989aab12f56f73c972592e7f3630e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalAlloc
GetSystemPowerStatus
GlobalUnlock
GlobalLock
GlobalFree
GlobalAlloc
SetFilePointer
ReadFile
GetFileSizeEx
GetCurrentThread
VirtualAlloc
VirtualQuery
ResumeThread
GetThreadContext
SuspendThread
OpenThread
SetThreadPriority
GetThreadPriority
VirtualProtect
InterlockedIncrement
InterlockedDecrement
GetTempFileNameW
GetTempPathW
GetPrivateProfileStringW
GetWindowsDirectoryW
lstrcmpiW
ReleaseSemaphore
OpenSemaphoreW
GetLocalTime
SetEvent
CreateEventW
WaitForMultipleObjects
WriteFile
lstrcmpiA
ResetEvent
OpenEventW
ExitProcess
CreateFileA
ExpandEnvironmentStringsW
GetACP
FormatMessageW
QueryPerformanceCounter
lstrcmpA
SetEnvironmentVariableA
CompareStringW
CompareStringA
SetStdHandle
GetConsoleOutputCP
GetTickCount
GetLocaleInfoW
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetStringTypeA
GetLocaleInfoA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetTimeZoneInformation
FlushFileBuffers
GetConsoleMode
GetConsoleCP
GetStartupInfoA
SetHandleCount
InitializeCriticalSectionAndSpinCount
HeapCreate
IsValidCodePage
GetOEMCP
GetStringTypeW
GetCPInfo
LCMapStringW
LCMapStringA
GetStdHandle
GetFileType
WriteConsoleW
CreateThread
ExitThread
GetDateFormatA
GetTimeFormatA
RtlUnwind
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
TlsFree
TlsAlloc
ReleaseMutex
HeapWalk
HeapLock
HeapUnlock
TlsSetValue
OutputDebugStringW
TlsGetValue
SetFilePointerEx
SetEndOfFile
LocalFileTimeToFileTime
GetSystemTimeAsFileTime
SystemTimeToFileTime
VirtualFree
IsProcessorFeaturePresent
LoadLibraryA
HeapSize
HeapReAlloc
HeapDestroy
OpenMutexW
GetModuleFileNameA
SetFileAttributesW
DeviceIoControl
GetProcessHeap
HeapAlloc
HeapFree
DeleteFileW
GetCurrentThreadId
GetLastError
CreateMutexW
QueryDosDeviceW
GetLongPathNameW
SetLastError
WideCharToMultiByte
DeleteCriticalSection
InitializeCriticalSection
GetDiskFreeSpaceExW
GetStartupInfoW
CreateProcessW
GetCurrentProcessId
WaitForSingleObject
GetExitCodeProcess
OpenProcess
WritePrivateProfileStringW
GetCommandLineW
GetPrivateProfileIntW
InterlockedExchange
InterlockedCompareExchange
Sleep
lstrlenW
FreeResource
GetSystemWindowsDirectoryW
GetModuleHandleA
GetSystemInfo
LoadLibraryExW
EnterCriticalSection
LeaveCriticalSection
FreeLibrary
LoadLibraryW
GetCurrentProcess
FlushInstructionCache
GetVersionExW
LocalFree
lstrlenA
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
CloseHandle
MultiByteToWideChar
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
RaiseException
GetSystemDirectoryW
GetModuleHandleW
GetProcAddress
GetModuleFileNameW
FindFirstFileW
FindNextFileW
FindClose
CreateFileW
WriteConsoleA
user32
GetWindowThreadProcessId
DrawTextW
ScrollWindow
PostQuitMessage
DialogBoxParamW
CreateDialogParamW
SetCursor
UnregisterClassA
LoadCursorW
SetTimer
ExitWindowsEx
GetShellWindow
WaitForInputIdle
RegisterClassW
GetClassInfoW
SendMessageTimeoutW
BringWindowToTop
IsIconic
wsprintfW
DispatchMessageW
TranslateMessage
GetMessageW
PeekMessageW
CharNextW
SetForegroundWindow
AttachThreadInput
GetForegroundWindow
LockSetForegroundWindow
GetLastInputInfo
LoadImageW
GetSystemMetrics
EndDialog
DestroyIcon
GetMonitorInfoW
MonitorFromWindow
CheckDlgButton
IsDlgButtonChecked
InflateRect
GetWindowPlacement
IsWindowEnabled
SetDlgItemTextW
KillTimer
IsWindow
IsDialogMessageW
RegisterClassExW
GetClassInfoExW
DefWindowProcW
DrawFocusRect
SendMessageW
DrawIconEx
SystemParametersInfoW
CopyRect
SetWindowLongW
CreateWindowExW
DestroyWindow
GetWindowLongW
SetWindowTextW
GetWindowTextW
GetWindowTextLengthW
LoadMenuW
DeleteMenu
EnableMenuItem
ModifyMenuW
DestroyMenu
MoveWindow
GetClientRect
ScreenToClient
UpdateLayeredWindow
SetWindowRgn
MonitorFromPoint
TrackPopupMenu
GetSubMenu
FindWindowExW
PostMessageW
RegisterWindowMessageW
FindWindowW
GetDlgItem
FillRect
GetActiveWindow
MessageBoxW
ReleaseDC
GetDC
EndPaint
BeginPaint
GetWindow
GetWindowRect
MapWindowPoints
SetWindowPos
GetCursorPos
CallWindowProcW
UnionRect
OffsetRect
SetRectEmpty
SetRect
PtInRect
GetParent
SetFocus
EnableWindow
RedrawWindow
IsWindowVisible
ShowWindow
InvalidateRect
UpdateWindow
gdi32
SetBkMode
CreatePen
EnumFontFamiliesW
CreateFontW
CreateDIBSection
StretchBlt
SetStretchBltMode
FillRgn
BitBlt
SelectObject
SetTextColor
ExtTextOutW
SetBkColor
CreateSolidBrush
CreateRoundRectRgn
CombineRgn
DeleteObject
SetViewportOrgEx
CreateCompatibleDC
CreateCompatibleBitmap
GetObjectW
DeleteDC
CreateRectRgn
SelectClipRgn
LineTo
RectVisible
MoveToEx
advapi32
GetTokenInformation
RegOpenKeyExA
RegQueryValueExA
RegEnumKeyExW
RegQueryInfoKeyW
RegDeleteKeyW
DuplicateTokenEx
RegSetValueExW
RegCreateKeyExW
RegDeleteValueW
LookupPrivilegeValueW
AdjustTokenPrivileges
OpenProcessToken
RegEnumKeyExA
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
shell32
SHBrowseForFolderW
SHGetPathFromIDListW
SHGetFolderPathW
Shell_NotifyIconW
ord165
ShellExecuteW
SHGetSpecialFolderPathA
CommandLineToArgvW
SHGetSpecialFolderPathW
ShellExecuteExW
ole32
CoUninitialize
CoCreateInstance
CoInitialize
CreateStreamOnHGlobal
CoTaskMemFree
CoTaskMemAlloc
CoTaskMemRealloc
oleaut32
SysAllocString
SysFreeString
VariantInit
VariantClear
SysAllocStringByteLen
SysStringByteLen
VarUI4FromStr
SysStringLen
shlwapi
PathUnquoteSpacesW
PathAppendW
PathFileExistsW
StrCmpIW
PathAddBackslashW
SHGetValueW
PathFileExistsA
PathRemoveFileSpecW
PathCombineW
StrStrIW
PathRemoveExtensionW
PathQuoteSpacesW
PathStripPathW
StrCmpW
SHSetValueW
PathIsDirectoryW
AssocQueryStringW
PathIsRelativeW
SHGetValueA
StrStrIA
PathFindExtensionW
SHSetValueA
PathCombineA
PathAppendA
gdiplus
GdipCloneImage
GdiplusStartup
GdipDisposeImage
GdipFree
GdipLoadImageFromStreamICM
GdipLoadImageFromStream
GdipAlloc
GdipDrawImageRectRectI
GdipDrawImagePointRectI
GdipCreateFromHDC
GdipGetImageHeight
GdipGetImageWidth
GdipDeleteGraphics
psapi
GetModuleBaseNameW
GetProcessImageFileNameW
Sections
.text Size: 700KB - Virtual size: 700KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 150KB - Virtual size: 150KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 184KB - Virtual size: 202KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 331KB - Virtual size: 332KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 46KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ