Static task
static1
Behavioral task
behavioral1
Sample
0cc4418d2db6513f2b55ed3f427d0730.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0cc4418d2db6513f2b55ed3f427d0730.exe
Resource
win10v2004-20240226-en
General
-
Target
0cc4418d2db6513f2b55ed3f427d0730
-
Size
41KB
-
MD5
0cc4418d2db6513f2b55ed3f427d0730
-
SHA1
c8de4732b7fc99a9b2ebacbac31033881981326c
-
SHA256
8a55a907e766d1333cbbb78c155776218269ca97ba407e5efb5458bbde3564a2
-
SHA512
02f09be42c05dbd48ba888d51bfde03d44e5d7e9b5ec5cb40ea6230c3ec3e8b87ffad397873e2d37c13e9fa0a06ca3d5a636aa02437bb9a27081009886e2569b
-
SSDEEP
384:cRvJdqOxpqm5LpvmLwtCO/e0Ajj6AH2XWwBOdw65UBsU0BSfcCoIV2+:ghUK3dIgCSJAvLiBOdP2Bd0BccsU+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0cc4418d2db6513f2b55ed3f427d0730
Files
-
0cc4418d2db6513f2b55ed3f427d0730.exe windows:4 windows x86 arch:x86
e1894de59266b62f743d38ca0eda457b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
PostQuitMessage
SendMessageW
DestroyWindow
DefWindowProcW
CreateWindowExW
LoadCursorW
LoadIconW
RegisterClassExW
LoadAcceleratorsW
GetMessageW
TranslateMessage
DispatchMessageW
kernel32
lstrcpynW
lstrcatW
GetCommandLineW
LoadLibraryW
GetTempPathW
ReadFile
CreateFileW
GetTickCount
GetModuleHandleA
GetProcessHeap
GetStartupInfoA
GetCommandLineA
HeapAlloc
GetModuleHandleW
ExitProcess
gdi32
TextOutW
SetTextAlign
SetBkColor
DeleteObject
GetBkColor
GetStockObject
CreateSolidBrush
comctl32
InitCommonControlsEx
shell32
CommandLineToArgvW
advapi32
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ