ServiceMain
Static task
static1
Behavioral task
behavioral1
Sample
ccde5410d93f798c3146ea0460de631b.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ccde5410d93f798c3146ea0460de631b.dll
Resource
win10v2004-20240226-en
General
-
Target
ccde5410d93f798c3146ea0460de631b
-
Size
74KB
-
MD5
ccde5410d93f798c3146ea0460de631b
-
SHA1
8eb9edfb597a3363cd91601d0486f4336206a1e3
-
SHA256
37d4fc046fdc341fece8fa1227b7c9d8a8bf837912b9d5a588fa729f93f5a602
-
SHA512
599016c5b44fe1395e6554a9f8e928fc040c8f9c49d18ae755c29526e60d2dc5bc67bd91091543ddd8a7735c4c51538fe53b606eb67d23eab38b8fa85e4e38f9
-
SSDEEP
1536:4pLwHEsUt1hwK4hrHULMxTZRKsvSHR6JoTg:EQEs4qDHtVmEJoTg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ccde5410d93f798c3146ea0460de631b
Files
-
ccde5410d93f798c3146ea0460de631b.dll windows:4 windows x86 arch:x86
b40572cae13d93c40a4e4631a3ed6b43
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
WriteFile
CreateFileA
GetModuleFileNameA
GetCurrentProcess
FreeLibrary
GetProcAddress
LoadLibraryA
Process32Next
Module32First
Process32First
CreateToolhelp32Snapshot
TerminateProcess
OpenProcess
Sleep
CreateThread
MoveFileExA
GetWindowsDirectoryA
MoveFileA
CopyFileA
GetFileSize
GlobalMemoryStatus
GetVersionExA
GetComputerNameA
GetTickCount
HeapAlloc
GetProcessHeap
GetCurrentProcessId
GetCurrentThreadId
LCMapStringW
LCMapStringA
FlushFileBuffers
ExitProcess
FindFirstFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetLastError
FindNextFileA
FindClose
CreatePipe
GetDriveTypeA
GetStartupInfoA
GetSystemDirectoryA
CreateProcessA
CloseHandle
DeleteFileA
ReadFile
SetStdHandle
GetOEMCP
GetACP
GetCPInfo
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
InterlockedIncrement
InterlockedDecrement
SetFilePointer
GetEnvironmentStringsW
GetEnvironmentStrings
HeapReAlloc
HeapFree
RtlUnwind
GetCommandLineA
GetVersion
VirtualFree
VirtualAlloc
IsBadWritePtr
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetModuleHandleA
GetEnvironmentVariableA
HeapDestroy
HeapCreate
HeapSize
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
user32
ExitWindowsEx
GetSystemMetrics
SetThreadDesktop
OpenDesktopA
SetProcessWindowStation
OpenWindowStationA
GetThreadDesktop
GetProcessWindowStation
CloseDesktop
CloseWindowStation
wsprintfA
gdi32
CreateDCA
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
BitBlt
GetDIBits
DeleteDC
DeleteObject
advapi32
RegisterServiceCtrlHandlerA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
SetServiceStatus
shell32
SHGetFileInfoA
ShellExecuteA
ws2_32
send
WSASocketA
gethostbyname
inet_addr
shutdown
recv
closesocket
connect
socket
htons
WSAStartup
setsockopt
htonl
sendto
Exports
Exports
Sections
.text Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ