Static task
static1
Behavioral task
behavioral1
Sample
cd29406006592156b9534256936624c8.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cd29406006592156b9534256936624c8.exe
Resource
win10v2004-20231215-en
General
-
Target
cd29406006592156b9534256936624c8
-
Size
43KB
-
MD5
cd29406006592156b9534256936624c8
-
SHA1
13b3cbdb0f9f92a2ce6c06e8dd06af93be7566b5
-
SHA256
5f90572c734fe0d8677d1e97e3f432afbd6dbcbe28d0b4c604efaae0d0666908
-
SHA512
cd8a03a6d086aff56044c765594fa64ffd9983d3f1949bca49669432c21bec46e7a0449602be7604768cc3968ffaa3bebdaa70bd24c1693a5774de1d202ae226
-
SSDEEP
768:88wV5a/FehMHzBHZDgGVNvEHZ3w/UqgyJ8cgYLK3dzS3vDfBWilwtljC6truPq:88wE/Fe+TBHDNgyJ8p3dIfBWkSuq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cd29406006592156b9534256936624c8
Files
-
cd29406006592156b9534256936624c8.exe windows:5 windows x86 arch:x86
c29676936a0a5d09f54adb5a5e2978ff
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
setupapi
CM_Find_Range
SetupRemoveInstallSectionFromDiskSpaceListW
SetupGetFileCompressionInfoExW
SetupDiClassNameFromGuidW
SetupGetSourceFileSizeW
CM_Get_DevNode_Custom_PropertyW
SetupDiInstallClassA
SetupDiGetSelectedDriverA
CM_Get_Res_Des_Data_Size_Ex
SetupGetFileQueueCount
CM_Add_IDW
SetupDiGetClassInstallParamsA
comdlg32
PageSetupDlgA
PrintDlgExW
dwOKSubclass
FindTextW
ChooseColorA
CommDlgExtendedError
ReplaceTextA
LoadAlterBitmap
ChooseFontA
PrintDlgW
GetOpenFileNameW
dwLBSubclass
GetSaveFileNameA
ChooseColorW
advapi32
SetSecurityDescriptorGroup
CryptSetProviderExA
CredGetTargetInfoW
SystemFunction030
ElfBackupEventLogFileW
WmiQueryAllDataMultipleW
SystemFunction041
QueryServiceLockStatusA
SaferiIsExecutableFileType
WmiSetSingleInstanceA
LsaSetQuotasForAccount
SaferCloseLevel
ConvertSDToStringSDRootDomainW
EnumServicesStatusA
GetSecurityInfoExW
LsaSetForestTrustInformation
SystemFunction020
SaferRecordEventLogEntry
GetSecurityDescriptorSacl
RegNotifyChangeKeyValue
AddAce
ConvertStringSDToSDRootDomainW
SystemFunction001
RegConnectRegistryA
RegQueryValueExW
SystemFunction040
RegSetValueExW
CreatePrivateObjectSecurity
BuildImpersonateTrusteeA
ConvertStringSidToSidW
RegOpenKeyExA
CredEnumerateA
GetWindowsAccountDomainSid
StartTraceW
expsrv
__vbaForEachCollAd
__vbaAryMove
PutMemObj
__vbaPutOwner4
__vbaVarNeg
__vbaLdZeroAry
__vbaVarCmpGe
rtcGetMonthOfYear
rtcGetFileAttr
__vbaNameFile
VarPtr
rtcCharValueBstr
EVENT_SINK2_AddRef
GetMem4
__vbaUI1Var
crypt32
I_CryptGetDefaultCryptProvForEncrypt
I_CryptWalkAllLruCacheEntries
RegQueryValueExU
CertCreateContext
CertAddCRLLinkToStore
CertCreateSelfSignCertificate
CertUnregisterSystemStore
CertFreeCertificateContext
CryptSignAndEncryptMessage
CryptExportPublicKeyInfoEx
CryptSIPRetrieveSubjectGuidForCatalogFile
CertSerializeCTLStoreElement
CryptFormatObject
CryptDecryptMessage
CertEnumCertificatesInStore
kernel32
GetConsoleAliasExesA
GetVersion
GlobalFindAtomW
Sleep
GetDefaultCommConfigA
GetSystemTimeAsFileTime
GetConsoleScreenBufferInfo
GetConsoleFontSize
GetCommandLineA
GetPriorityClass
VirtualAlloc
QueryMemoryResourceNotification
PeekConsoleInputA
ReadConsoleInputW
SetConsoleTitleW
LoadLibraryA
GetComputerNameW
LZCreateFileW
WriteConsoleA
GetConsoleAliasExesW
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 1022B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 268B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ