Static task
static1
Behavioral task
behavioral1
Sample
1ccd26ea7771855951d62df3cc0d8fc6a9e367e110b0e869aad8e2655dfdc2f1.exe
Resource
win7-20240221-en
General
-
Target
1ccd26ea7771855951d62df3cc0d8fc6a9e367e110b0e869aad8e2655dfdc2f1
-
Size
756KB
-
MD5
1de1f5d320577ea30a8e8535cabc0e37
-
SHA1
7eab68525be999494410a768c98e97659844c181
-
SHA256
1ccd26ea7771855951d62df3cc0d8fc6a9e367e110b0e869aad8e2655dfdc2f1
-
SHA512
87cd217cd856f397adfcc371e4c5715159c7c8d8a401e8e82acbc864c4d0d87d67f5c714b45507c17a6327054d97c56cc1f2cbc33c2d9487474e80195be0ff2f
-
SSDEEP
12288:Hi2cAro2HQVWAHkFSq2hAWJYlMUtrxlyuJVRe8ykCZd7WdF4nfV:Hi2Tro2H2HESq2eWJ6MQjySjyHk4nfV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 1ccd26ea7771855951d62df3cc0d8fc6a9e367e110b0e869aad8e2655dfdc2f1
Files
-
1ccd26ea7771855951d62df3cc0d8fc6a9e367e110b0e869aad8e2655dfdc2f1.exe windows:4 windows x86 arch:x86
d32357501b59d8d40cb2a554799505fe
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FlushFileBuffers
lstrcpynA
LocalAlloc
TlsAlloc
DeleteCriticalSection
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
GlobalFlags
WritePrivateProfileStringA
GlobalFindAtomA
GlobalAddAtomA
GetProcessVersion
SetErrorMode
GetCPInfo
GetOEMCP
RtlUnwind
RaiseException
HeapSize
GetACP
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadCodePtr
SetStdHandle
InterlockedExchange
LocalFree
InterlockedDecrement
InterlockedIncrement
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
GetVersion
FindResourceA
LoadResource
LockResource
SizeofResource
lstrcatA
SetLastError
GlobalAlloc
lstrcpyA
LoadLibraryExA
EnumResourceNamesA
Sleep
OpenProcess
TerminateProcess
SetFileAttributesA
SetFilePointer
GlobalLock
GlobalUnlock
GlobalFree
CreateToolhelp32Snapshot
Process32First
Process32Next
WideCharToMultiByte
MultiByteToWideChar
GetCurrentProcess
GetLastError
GetVersionExA
GetWindowsDirectoryA
GetSystemDirectoryA
GetTempPathA
lstrlenA
LCMapStringA
LeaveCriticalSection
InitializeCriticalSection
EnterCriticalSection
LoadLibraryA
GetProcAddress
FreeLibrary
GetCommandLineA
CopyFileA
FindClose
FindFirstFileA
FindNextFileA
DeleteFileA
GetFileSize
ReadFile
GetModuleFileNameA
GetStartupInfoA
CreateProcessA
WaitForSingleObject
CreateFileA
WriteFile
CloseHandle
IsBadReadPtr
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetModuleHandleA
GetProcessHeap
EndUpdateResourceA
UpdateResourceA
RtlMoveMemory
lstrcpynW
BeginUpdateResourceA
GlobalGetAtomNameA
user32
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
DestroyMenu
SetFocus
SetWindowPos
GetCapture
GetMenuItemCount
SetWindowTextA
GetDlgCtrlID
DestroyWindow
UnhookWindowsHookEx
GrayStringA
DrawTextA
TabbedTextOutA
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetSubMenu
GetMenuItemID
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
ClientToScreen
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessagePos
GetMessageTime
RegisterWindowMessageA
IsIconic
GetWindowPlacement
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetKeyState
CallNextHookEx
ValidateRect
SetWindowsHookExA
GetLastActivePopup
SetCursor
PostMessageA
PostQuitMessage
GetWindow
IsWindowVisible
GetWindowLongA
GetWindowTextA
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
GetCursorPos
SetWindowLongA
GetDlgItem
ShowWindow
SystemParametersInfoA
GetDC
ReleaseDC
FindWindowA
GetWindowThreadProcessId
GetClassNameA
SendMessageA
GetWindowRect
GetSystemMetrics
SetForegroundWindow
GetActiveWindow
GetForegroundWindow
IsWindowEnabled
GetParent
EnableWindow
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
MsgWaitForMultipleObjects
PtInRect
UnregisterClassA
ole32
CoCreateInstance
CoUninitialize
gdi32
ExtTextOutA
TextOutA
RectVisible
PtVisible
Escape
GetObjectA
GetStockObject
DeleteObject
DeleteDC
SelectObject
GetDeviceCaps
CreateBitmap
SaveDC
RestoreDC
SetBkColor
SetTextColor
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
advapi32
RegCloseKey
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
shell32
SHGetFileInfoA
SHGetSpecialFolderPathA
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
comctl32
ord17
Sections
.text Size: 96KB - Virtual size: 95KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 396KB - Virtual size: 530KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 240KB - Virtual size: 239KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE