Static task
static1
Behavioral task
behavioral1
Sample
ccd4f3e3e8aacf952869e34472db9983.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
ccd4f3e3e8aacf952869e34472db9983.exe
Resource
win10v2004-20240226-en
General
-
Target
ccd4f3e3e8aacf952869e34472db9983
-
Size
13KB
-
MD5
ccd4f3e3e8aacf952869e34472db9983
-
SHA1
7af8ece6d8ca96771c76930ecc77228c1c8e12f2
-
SHA256
10e209500a19a85df31c4694c7452e9c93e66d34a1db8a7582ce0ca4d48e217a
-
SHA512
5101dd1d648cf9ee2caa93cc4ade6a9097aba1c9ce04681c910bb17f349d425b394f4667a2a1fac064823e5891659c2a01fd8c15fb5d26c703e776bc414eb52b
-
SSDEEP
192:9WRsrWCHGuyWhjaLIHvLPNvUOt72tWli/qQusPQvupjVi:9kxIr8YlIqQu+Ts
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ccd4f3e3e8aacf952869e34472db9983
Files
-
ccd4f3e3e8aacf952869e34472db9983.exe windows:5 windows x64 arch:x64
ddc3500ebef988d446bc6c783988c850
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
OpenProcess
Process32Next
QueryFullProcessImageNameA
CreateToolhelp32Snapshot
Sleep
GetTempPathA
GetModuleFileNameA
CreateFileA
WriteFile
CloseHandle
GetCurrentProcess
Process32First
GetLastError
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoA
GetSystemTimeAsFileTime
advapi32
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegCreateKeyExA
shell32
ShellExecuteA
urlmon
URLDownloadToFileA
wininet
DeleteUrlCacheEntryA
msvcr90
memset
malloc
strlen
strcpy
sprintf
strncpy
_amsg_exit
__getmainargs
__C_specific_handler
_XcptFilter
_exit
_ismbblead
_cexit
exit
_acmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_commode
_fmode
_encode_pointer
__set_app_type
__crt_debugger_hook
?terminate@@YAXXZ
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
free
fopen
fseek
ftell
fclose
strrchr
strcat
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 432B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 700B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ