Static task
static1
Behavioral task
behavioral1
Sample
ccd65b6e31ecc0c9f9016d02959afd0a.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
ccd65b6e31ecc0c9f9016d02959afd0a.exe
Resource
win10v2004-20240226-en
General
-
Target
ccd65b6e31ecc0c9f9016d02959afd0a
-
Size
104KB
-
MD5
ccd65b6e31ecc0c9f9016d02959afd0a
-
SHA1
75b6bfdd6ace2511a3e14ef34867e1710f454be2
-
SHA256
75f5536ff0fee5d572f641852cf2b4d20d71be58e60ee762d21d05b888c1fac7
-
SHA512
f1dce1ce7aeb6b8f85bb3d902a9f9a5f9fd0409bd30b0d352c58d45272c3ffa948eee7032689bdd0276c11ba05ae0600fa42bd38c811b768ed555dc8c3f503aa
-
SSDEEP
1536:S6HGhwSsky22UJ826eeJo5FRfW5RWTiXJ3j++PObnJTA5:S6HGhGkckeJoFfYWTiXJ3i+AnJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ccd65b6e31ecc0c9f9016d02959afd0a
Files
-
ccd65b6e31ecc0c9f9016d02959afd0a.exe windows:4 windows x86 arch:x86
7ecf453094136285d8d10465f2165610
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
strrchr
memcmp
strcpy
memset
__CxxFrameHandler
??2@YAPAXI@Z
sprintf
strstr
srand
time
_access
free
malloc
rand
strlen
strncpy
atol
rename
strcmp
strcat
__dllonexit
_onexit
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
??1type_info@@UAE@XZ
_stricmp
_strcmpi
_ltoa
_rmdir
_chmod
_strupr
_strlwr
??0exception@@QAE@ABQBD@Z
??1exception@@UAE@XZ
_CxxThrowException
??0exception@@QAE@ABV0@@Z
memchr
memmove
??3@YAXPAX@Z
strchr
sscanf
memcpy
strcspn
atoi
_chdrive
_chdir
_strnicmp
kernel32
LockResource
FreeResource
GetTempFileNameA
TerminateProcess
GetModuleHandleA
lstrcpyA
WideCharToMultiByte
lstrlenW
Sleep
lstrlenA
LoadResource
lstrcpynA
IsDebuggerPresent
FreeLibrary
LoadLibraryA
ResetEvent
WaitForSingleObject
SetEvent
CreateEventA
CloseHandle
ReadFile
CreateFileA
DeleteFileA
lstrcatA
GetTempPathA
GetSystemDirectoryA
GetTickCount
GetModuleFileNameA
GetLastError
WriteFile
SetFilePointer
GetFileSize
CopyFileA
RemoveDirectoryA
lstrcmpiA
CreateProcessA
OpenProcess
GetCurrentProcessId
GetLocalTime
GetStartupInfoA
GetCurrentProcess
CreateDirectoryA
MultiByteToWideChar
FormatMessageA
SizeofResource
FindResourceA
GetProcAddress
LocalFree
GetVersionExA
LocalAlloc
InterlockedExchange
InterlockedDecrement
RaiseException
user32
GetClientRect
SetForegroundWindow
CreateWindowExA
DestroyWindow
RegisterClassExA
LoadCursorA
DefWindowProcA
GetSystemMetrics
PostQuitMessage
PeekMessageA
SetWindowPos
SendMessageA
FindWindowExA
IsWindow
SetTimer
KillTimer
GetMessageA
LoadStringA
TranslateMessage
DispatchMessageA
CharLowerA
FindWindowA
GetDlgItem
IsWindowVisible
GetDlgItemTextA
SetDlgItemTextA
BeginPaint
DrawTextA
GetDesktopWindow
FlashWindow
GetWindowThreadProcessId
ReleaseDC
GetDC
EndPaint
DialogBoxParamA
EndDialog
CharUpperA
GetActiveWindow
MessageBoxA
PostMessageA
LoadIconA
ShowWindow
MoveWindow
gdi32
GetDeviceCaps
CreateSolidBrush
SetTextColor
CreateFontA
Rectangle
SelectObject
SetBkColor
advapi32
AdjustTokenPrivileges
RegDeleteKeyA
RegCreateKeyExA
CryptDecrypt
CryptAcquireContextA
CryptDestroyKey
CryptDestroyHash
CryptCreateHash
CryptHashData
CryptDeriveKey
CryptEncrypt
CryptReleaseContext
OpenProcessToken
LookupPrivilegeValueA
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegSetValueExA
RegQueryValueExA
RegCloseKey
RegConnectRegistryA
RegOpenKeyExA
shell32
ShellExecuteA
Shell_NotifyIconA
urlmon
URLDownloadToCacheFileA
URLDownloadToFileA
wininet
InternetOpenA
InternetReadFile
InternetCrackUrlA
InternetCloseHandle
InternetGetConnectedState
InternetOpenUrlA
ole32
OleRun
CoUninitialize
CoInitialize
CLSIDFromString
CoCreateInstance
CoInitializeEx
oleaut32
SysAllocString
GetErrorInfo
SysFreeString
VariantInit
SysStringLen
VariantCopy
VariantClear
VariantChangeType
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
Sections
.text Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE