E:\sourcecode\ghe\ControlCenter4\binary\Release\BrCcUxSys.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ad1c8e52d077a947dae9905fbcdde27662ed70733279f3da710eb9bc8241e99c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ad1c8e52d077a947dae9905fbcdde27662ed70733279f3da710eb9bc8241e99c.exe
Resource
win10v2004-20240412-en
General
-
Target
ad1c8e52d077a947dae9905fbcdde27662ed70733279f3da710eb9bc8241e99c
-
Size
1.7MB
-
MD5
c98824f0a27e8d64fc37b493334a3332
-
SHA1
bb6ff76662fa73f6e5eeba555c7ca21eb1fb2bd4
-
SHA256
ad1c8e52d077a947dae9905fbcdde27662ed70733279f3da710eb9bc8241e99c
-
SHA512
885f1e1d80647de13a4cb664986580beed8fed230b0a3ece23c028ad36b363decbede27d3f20b5c94c3cabdff577efa583d0f0ceda0682e5a5b20316139b5754
-
SSDEEP
24576:TvWDO5TVKo5TByUaefN4vcNS5UFqKm9v2KahYlLfdxdVtN115XsIyvA3krEH71:DWDO5TVd6efKv/DYMLfdhtN13XsIQA3J
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ad1c8e52d077a947dae9905fbcdde27662ed70733279f3da710eb9bc8241e99c
Files
-
ad1c8e52d077a947dae9905fbcdde27662ed70733279f3da710eb9bc8241e99c.exe windows:5 windows x86 arch:x86
72dfd72d68de0c9a25a89a9b78d402f3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
ord16
PropertySheetW
CreatePropertySheetPageW
ord17
msimg32
AlphaBlend
GradientFill
shlwapi
PathFileExistsW
PathFindFileNameW
PathIsDirectoryW
StrCmpW
PathAddBackslashW
kernel32
GetDateFormatW
GetLocalTime
HeapReAlloc
HeapAlloc
HeapFree
GetProcessHeap
OpenProcess
GetTimeFormatW
FileTimeToSystemTime
CompareStringW
GetExitCodeThread
FileTimeToLocalFileTime
GetCurrentProcessId
SetFileAttributesW
FindResourceW
LoadResource
LockResource
GetPrivateProfileStringW
GetPrivateProfileIntW
GetModuleHandleW
GetACP
IsValidCodePage
MulDiv
GetLocaleInfoW
GetModuleFileNameW
CreateMutexW
ReleaseMutex
GetCurrentProcess
ConnectNamedPipe
CreateNamedPipeW
FlushFileBuffers
GetFileSize
CopyFileW
GetFileTime
Sleep
ReleaseSemaphore
CreateSemaphoreW
OpenSemaphoreW
lstrcpynW
lstrcatW
GetTempFileNameW
GetFileAttributesW
ExpandEnvironmentStringsA
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
HeapDestroy
HeapCreate
ExitProcess
HeapSize
IsProcessorFeaturePresent
GetStdHandle
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
LCMapStringW
RtlUnwind
GetCPInfo
RaiseException
GetStartupInfoW
HeapSetInformation
CreateThread
ResumeThread
ExitThread
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
DecodePointer
EncodePointer
InterlockedExchange
InterlockedDecrement
InterlockedIncrement
CreateDirectoryW
GetFileSizeEx
SetFilePointerEx
OpenFileMappingW
CreateFileMappingW
FlushViewOfFile
UnmapViewOfFile
MapViewOfFile
OpenEventW
GetSystemTime
FindNextFileW
MoveFileExW
GetCurrentThreadId
GetTempPathW
lstrcpyW
LocalFree
SetLastError
FormatMessageW
lstrcmpiW
SetEndOfFile
GetCommandLineW
SetEvent
WaitForSingleObject
CloseHandle
FindClose
GetLastError
CreateFileW
ReadFile
WriteFile
FindFirstFileW
LoadLibraryW
LoadLibraryA
GetProcAddress
FreeLibrary
MultiByteToWideChar
WideCharToMultiByte
DeleteFileW
lstrlenW
GetOEMCP
GetStringTypeW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
SetFilePointer
GetConsoleCP
GetConsoleMode
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
SetStdHandle
WriteConsoleW
lstrcmpW
user32
GetDoubleClickTime
SetPropW
ReleaseCapture
GetPropW
AppendMenuW
CreatePopupMenu
SetMenuDefaultItem
DestroyMenu
PtInRect
InflateRect
SetTimer
KillTimer
GetGuiResources
WindowFromPoint
GetScrollInfo
ScrollWindowEx
SetScrollInfo
DefWindowProcW
GetActiveWindow
GetClientRect
MessageBoxW
DialogBoxParamW
GetClassLongW
SetCapture
RemovePropW
IsDialogMessageW
EndDialog
CreateDialogParamW
TrackMouseEvent
DrawFocusRect
GetKeyState
PostQuitMessage
SetForegroundWindow
GetSysColor
GetForegroundWindow
GetWindowThreadProcessId
GetMessageW
TranslateMessage
DispatchMessageW
LoadStringW
DestroyWindow
GetWindowLongW
CreateWindowExW
MoveWindow
wsprintfW
LoadImageW
UpdateWindow
TrackPopupMenu
RemoveMenu
CheckRadioButton
SetWindowRgn
GetWindowTextLengthW
GetWindowTextW
GetDesktopWindow
SetWindowTextW
IsIconic
IsZoomed
GetWindowPlacement
GetAncestor
GetDlgItem
ShowWindow
FindWindowExW
SetActiveWindow
FindWindowW
BringWindowToTop
SetWindowPos
SetCursor
InvalidateRect
ScreenToClient
GetWindowRect
GetParent
GetCursorPos
DrawTextW
GetDC
ReleaseDC
SetWindowLongW
CallWindowProcW
EndPaint
GetSystemMenu
PostMessageW
LoadCursorW
IsWindowEnabled
SetFocus
BeginPaint
EnableMenuItem
IsWindowVisible
SendMessageW
EnableWindow
SetProcessDefaultLayout
GetSystemMetrics
UnregisterClassW
RegisterClassExW
CharUpperW
GetSysColorBrush
AttachThreadInput
gdi32
CreateCompatibleBitmap
CreateDIBSection
CreateCompatibleDC
DeleteDC
GetDIBits
SetBkColor
GetDeviceCaps
SetBkMode
CreateBitmap
CreateRoundRectRgn
CreateRectRgn
CombineRgn
SetTextColor
CreateFontW
StretchBlt
SetBrushOrgEx
SetMapMode
StretchDIBits
SetStretchBltMode
PlgBlt
MoveToEx
PatBlt
LineTo
CreatePen
SetROP2
CreateSolidBrush
SetLayout
RoundRect
GetTextExtentPoint32W
SelectObject
GetObjectW
GetStockObject
BitBlt
DeleteObject
winspool.drv
ord203
DocumentPropertiesW
comdlg32
GetSaveFileNameW
advapi32
RegQueryValueExW
RegDeleteValueW
RegOpenKeyExW
RegSetValueExW
RegCloseKey
CryptAcquireContextW
CryptDeriveKey
CryptReleaseContext
CryptEncrypt
CryptCreateHash
CryptDecrypt
CryptDestroyHash
CryptHashData
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyExW
shell32
SHGetFileInfoW
DoEnvironmentSubstW
SHAppBarMessage
SHGetFolderPathW
SHGetSpecialFolderPathW
Shell_NotifyIconW
ole32
CoUninitialize
CoInitialize
oleaut32
SysFreeString
Sections
.text Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 161KB - Virtual size: 160KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 21KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 96KB - Virtual size: 95KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ