Static task
static1
Behavioral task
behavioral1
Sample
cc903736386900d53278787cae8c807b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cc903736386900d53278787cae8c807b.exe
Resource
win10v2004-20240226-en
General
-
Target
cc903736386900d53278787cae8c807b
-
Size
51KB
-
MD5
cc903736386900d53278787cae8c807b
-
SHA1
3d5678aa7b63858a200ec6413d791eb9d30f47e5
-
SHA256
ff2cd32a088690963db73d744d9f68a8e7a95bca232d13834c8dd09eec09565c
-
SHA512
a0039ba0615f9ee3eab32dfc14b4380ccfde53465f692b5a2b786d903280a7b0aa305eb79e0714c5ad5802d959f5c36e7350f727653eeb2e8576e0df46cfb7c1
-
SSDEEP
1536:ss+EzYqkSOUN95bpOho1Bo9XKpxQfIlR:31pNbbsO7j
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cc903736386900d53278787cae8c807b
Files
-
cc903736386900d53278787cae8c807b.exe windows:5 windows x86 arch:x86
164cfcac541a7ac8708f5df850d78093
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
CreateFileA
lstrcmpA
lstrlenA
lstrcpynA
GetTickCount
WriteFile
GetCommandLineA
lstrcatA
GetLastError
GetProcAddress
VirtualAlloc
GetTempFileNameA
GetLocalTime
LoadLibraryA
OpenMutexA
FindAtomA
GetModuleFileNameA
GetModuleHandleA
CreateMutexA
CloseHandle
GetVersion
GetTempPathA
GetSystemTime
lstrcpyA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
VirtualQuery
RtlUnwind
IsDebuggerPresent
user32
GetWindowRect
ClientToScreen
wsprintfA
InflateRect
GetCursorPos
GetCaretPos
EqualRect
IsWindowVisible
GetFocus
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 39KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE