Static task
static1
Behavioral task
behavioral1
Sample
0cc3c2b7090fb96d3944adaa980c9d5a8450f66f1e5b878c589d1ac14a8e1db5.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0cc3c2b7090fb96d3944adaa980c9d5a8450f66f1e5b878c589d1ac14a8e1db5.exe
Resource
win10v2004-20240412-en
General
-
Target
0cc3c2b7090fb96d3944adaa980c9d5a8450f66f1e5b878c589d1ac14a8e1db5
-
Size
484KB
-
MD5
0c73c729b8e4da2029e0b5d9781d412d
-
SHA1
00ebd1ffb0b9c8ddbeca9c212691b3c7b305483a
-
SHA256
0cc3c2b7090fb96d3944adaa980c9d5a8450f66f1e5b878c589d1ac14a8e1db5
-
SHA512
de7801aa938a0fc4e6ba0c988f35d9c1124716f32a983fafc7cb125b0612410e86d2903218943d5853c31862323835b370d19772e2f052489b91e2b5e435c04e
-
SSDEEP
12288:GLPkCDt1EG2XVekhdeTiQpvbLI3q+cb/4XlRhIVhq:GLPkQ1bqAa0vbLaqBbw3F
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0cc3c2b7090fb96d3944adaa980c9d5a8450f66f1e5b878c589d1ac14a8e1db5
Files
-
0cc3c2b7090fb96d3944adaa980c9d5a8450f66f1e5b878c589d1ac14a8e1db5.exe windows:5 windows x86 arch:x86
18c89e2ec0a399c68eaedd6551ce71fc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualFree
GetModuleFileNameW
CreateFileW
GetFileSize
ReadFile
CloseHandle
VirtualAlloc
GetModuleHandleA
GetProcAddress
GetProcessHeap
GetCurrentProcess
TerminateProcess
HeapAlloc
HeapFree
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 464B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 239KB - Virtual size: 239KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 756B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.l2 Size: 239KB - Virtual size: 239KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ