Static task
static1
Behavioral task
behavioral1
Sample
ccc0670c4622bec4af5a719550174916.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ccc0670c4622bec4af5a719550174916.exe
Resource
win10v2004-20240226-en
General
-
Target
ccc0670c4622bec4af5a719550174916
-
Size
78KB
-
MD5
ccc0670c4622bec4af5a719550174916
-
SHA1
9f01b830cc7809f33d2fe5c1801ac516ba76304c
-
SHA256
f1a3c1144567fb95f6011e7e1a1c817e71f1b2d132588dc699945fa35ace4017
-
SHA512
1c205bb327ddc244bf25ff203eee19dd53c258698ca00cbf314d388576ff20ed32d57a7ce10bfedae474b1a5292eaf5798f6c5c60a89fed6b26006d7c77f4b13
-
SSDEEP
1536:kx91vP7ac1adEWTJD3KRUMThWMPNA58tBsH2xD:kx3P1adTJjKRUMThWMPu5n
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ccc0670c4622bec4af5a719550174916
Files
-
ccc0670c4622bec4af5a719550174916.exe windows:4 windows x86 arch:x86
9579b458d212cf5f1fccee18ae66d9a4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
TerminateProcess
SetProcessPriorityBoost
SetThreadPriority
GetCurrentThread
SetPriorityClass
GetCurrentProcess
GetEnvironmentVariableA
GetShortPathNameA
GetModuleFileNameA
IsBadWritePtr
GetVolumeInformationA
GetComputerNameA
CloseHandle
WriteFile
CreateFileA
GetTempPathA
CreateProcessA
user32
wsprintfA
shell32
SHChangeNotify
ShellExecuteExA
wininet
InternetReadFile
InternetOpenA
InternetCloseHandle
InternetOpenUrlA
msvcrt
strstr
??2@YAPAXI@Z
??3@YAXPAX@Z
atoi
_except_handler3
atol
strncpy
Sections
.text Size: 75KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ