Static task
static1
Behavioral task
behavioral1
Sample
cc00b9fb2e4e057c14583b6c23bffb2c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cc00b9fb2e4e057c14583b6c23bffb2c.exe
Resource
win10v2004-20240226-en
General
-
Target
cc00b9fb2e4e057c14583b6c23bffb2c
-
Size
184KB
-
MD5
cc00b9fb2e4e057c14583b6c23bffb2c
-
SHA1
80d0dbe03c52646dad7ccb78ce0c2586b3a15f42
-
SHA256
e769d9a0840b1d98d61a5777f7044afae75649e298013255714320b88b100d2f
-
SHA512
e9f5bf7a663f6736446ab099da80651fb02897c42a06876389e299c8c746670b84e22a6728c4d25cc039956b78ea40af0f4f44fe63429189aafd97aac7aafd29
-
SSDEEP
1536:kSw6lpnRSuSlVid+JbBa0fdzZvLPuELarWh7zjAePMqn18LNVHwN0Ttt9SP3s4V:PZFSG6sqXLGqAO2RXMP3sa
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cc00b9fb2e4e057c14583b6c23bffb2c
Files
-
cc00b9fb2e4e057c14583b6c23bffb2c.exe windows:4 windows x86 arch:x86
2bb21495e4ed7807a0230d9049e512f0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
GetModuleFileNameA
DuplicateHandle
GetCurrentProcess
OpenProcess
WriteFile
FreeLibrary
GetProcAddress
LoadLibraryA
TerminateProcess
WaitForSingleObject
CreateProcessA
GetStartupInfoA
GetModuleHandleA
CloseHandle
Sleep
WinExec
GetVersionExA
GetLastError
GetSystemDirectoryA
GetFileAttributesExA
SetFileTime
WideCharToMultiByte
user32
GetDesktopWindow
DispatchMessageA
TranslateMessage
GetMessageA
RegisterClassExA
DefWindowProcA
PostQuitMessage
ShowWindow
CreateWindowExA
SendMessageTimeoutA
RegisterWindowMessageA
GetClassNameA
PostMessageA
EnumChildWindows
GetWindowThreadProcessId
EnumWindows
advapi32
RegQueryValueExA
OpenSCManagerA
StartServiceA
OpenServiceA
DeleteService
ConvertSidToStringSidA
LookupAccountNameA
GetUserNameA
CreateServiceA
RegCloseKey
RegOpenKeyExA
CloseServiceHandle
shell32
SHGetSpecialFolderPathA
ole32
CoInitialize
CoUninitialize
oleaut32
SysFreeString
VariantClear
shlwapi
SHGetValueA
SHSetValueA
msvcrt
rand
_stricmp
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
__CxxFrameHandler
strstr
strchr
atoi
wcslen
_access
??2@YAPAXI@Z
??3@YAXPAX@Z
_strlwr
fclose
fflush
fwrite
fopen
srand
time
sprintf
dbghelp
ImageNtHeader
Sections
.text Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 124KB - Virtual size: 121KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
qdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
odata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ndata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
mdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
edata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
cdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
idata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ