c:\Users\Administrator\Jenkins\workspace\ccx-libraries-windows\build\Release\CCLibrary.pdb
Static task
static1
Behavioral task
behavioral1
Sample
8b5089aa6f3f07193130b1702b63a0cfaf29c6fcec7337ab229185d81fb0d67c.exe
Resource
win7-20231215-en
General
-
Target
8b5089aa6f3f07193130b1702b63a0cfaf29c6fcec7337ab229185d81fb0d67c
-
Size
326KB
-
MD5
81ea5789584781307be5650dfe6e807d
-
SHA1
559a768c71d8958601c4449f6189bd50895a6c9a
-
SHA256
8b5089aa6f3f07193130b1702b63a0cfaf29c6fcec7337ab229185d81fb0d67c
-
SHA512
e211ccee6c5be42aba1f8cfa99e9808e0b02af25b532edb42e8c5d5cf8775c624fea9ff62863ecb554f3c14315028dd71189eee3ff5565985cc2b0bcc125aaba
-
SSDEEP
6144:kj83kXffMIwywVvUKBrcisb765kohreOwSYA/U:j3yfU3V1BrcdEkosCc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8b5089aa6f3f07193130b1702b63a0cfaf29c6fcec7337ab229185d81fb0d67c
Files
-
8b5089aa6f3f07193130b1702b63a0cfaf29c6fcec7337ab229185d81fb0d67c.exe windows:5 windows x64 arch:x64
b5464cd11a888f8c2431f32a12ac9b22
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
SetInformationJobObject
QueryInformationJobObject
ReleaseSemaphore
AssignProcessToJobObject
GetModuleFileNameW
CreateJobObjectW
CreateMutexA
WaitForSingleObject
ReleaseMutex
OpenSemaphoreA
GetTempPathA
GetLastError
CloseHandle
GetLocalTime
CreateProcessW
GetModuleHandleW
CreateDirectoryA
GetExitCodeProcess
SetEndOfFile
MultiByteToWideChar
WideCharToMultiByte
GetStringTypeW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetLastError
InitializeCriticalSectionAndSpinCount
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetProcAddress
EncodePointer
DecodePointer
LCMapStringW
GetLocaleInfoW
GetCPInfo
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlPcToFileHeader
RaiseException
RtlUnwindEx
FreeLibrary
LoadLibraryExW
GetStdHandle
WriteFile
ExitProcess
GetModuleHandleExW
HeapAlloc
FlushFileBuffers
GetConsoleCP
GetConsoleMode
HeapFree
GetFileSizeEx
SetFilePointerEx
GetFileType
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
ReadFile
ReadConsoleW
HeapReAlloc
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
GetProcessHeap
CreateFileW
HeapSize
WriteConsoleW
RtlUnwind
Sections
.text Size: 168KB - Virtual size: 168KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 87KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ