Static task
static1
Behavioral task
behavioral1
Sample
ccd433b1f72f18e4937a24c704f4a3ba.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ccd433b1f72f18e4937a24c704f4a3ba.exe
Resource
win10v2004-20240226-en
General
-
Target
ccd433b1f72f18e4937a24c704f4a3ba
-
Size
285KB
-
MD5
ccd433b1f72f18e4937a24c704f4a3ba
-
SHA1
d2f5412ddd457e0af941fccf9fa451c4985e2a63
-
SHA256
15c06642d9fee92fe9eebae02238897d0951650db0c813cf45b6f5315d0ec136
-
SHA512
86b446b38c18a02c969c05105096bc004d2a0db01b772507c00acfe142574f08a764d3f46ae0c1d393d66dbd3a6eeea254709e3242d569f052fab042d9a18c94
-
SSDEEP
6144:CWBRxSp6Ytv4mI2mSK+QIBNyd/Qd9F/fJBe:CWBRxSp82mSBQd/A/RQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ccd433b1f72f18e4937a24c704f4a3ba
Files
-
ccd433b1f72f18e4937a24c704f4a3ba.exe windows:5 windows x86 arch:x86
e150a0f4166b7e820bdcca54966771c2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetWindowsDirectoryA
WriteFile
GlobalAlloc
Sleep
CreateEventA
TransactNamedPipe
VerifyVersionInfoA
FileTimeToSystemTime
GetMailslotInfo
ReadFile
GetSystemDirectoryA
CreateDirectoryA
GetLastError
WaitNamedPipeA
GlobalFree
LoadLibraryA
GetSystemInfo
SetNamedPipeHandleState
SetEnvironmentVariableA
GetModuleFileNameA
CreateMailslotA
GetFileTime
CloseHandle
FindResourceA
LoadResource
SizeofResource
LockResource
VerSetConditionMask
SystemTimeToTzSpecificLocalTime
FreeLibrary
lstrlenA
CreateFileA
GetProcAddress
GetComputerNameA
SetEndOfFile
CreateFileW
FlushFileBuffers
WriteConsoleW
SetStdHandle
OutputDebugStringW
EncodePointer
DecodePointer
IsDebuggerPresent
IsProcessorFeaturePresent
GetCommandLineA
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
SetLastError
GetCurrentThreadId
MultiByteToWideChar
ExitProcess
GetModuleHandleExW
AreFileApisANSI
WideCharToMultiByte
HeapSize
EnterCriticalSection
LeaveCriticalSection
HeapFree
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
RaiseException
HeapAlloc
GetProcessHeap
GetStdHandle
GetFileType
DeleteCriticalSection
GetModuleFileNameW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
RtlUnwind
GetConsoleCP
GetConsoleMode
GetStringTypeW
LCMapStringW
LoadLibraryExW
HeapReAlloc
SetFilePointerEx
ReadConsoleW
advapi32
RegEnumValueA
RegQueryInfoKeyA
RegOpenKeyExA
RegEnumKeyExA
RegDeleteKeyA
RegCloseKey
shell32
SHFileOperationA
rpcrt4
UuidCreate
UuidToStringA
RpcStringFreeA
Sections
.text Size: 76KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 138KB - Virtual size: 138KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ