Static task
static1
Behavioral task
behavioral1
Sample
Device/HarddiskVolume4/ProgramData/lck.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Device/HarddiskVolume4/ProgramData/lck.exe
Resource
win10v2004-20240426-en
General
-
Target
NCHCVS22_2024-05-26_02_47_15.431.zip
-
Size
57KB
-
MD5
5c5df053a8fbfcd6893342fd7a77d752
-
SHA1
99a629828a12283361eab9a81841fe18d71b97a7
-
SHA256
b0022279123a02601aaf4193942b35f1ba4383bd4347c252efc0ca0587c67470
-
SHA512
abdf0e5a90269684f636d2e7dfd6dc8cbd45d19b5afce2311970fdfc3565070281824b61de2a5a380e0f5e7817a3e39f34a1072c64d4c4f5637fe4c917b32b59
-
SSDEEP
768:NZRkP2rPF4C44fc0zvmc2/x56W4wC5+Xz8Fh1z9tdoNbwzdY7WZSU/XZNVg:NZs2rIqc6ec2/xLC5vrroNbcqWZtXZTg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/Device/HarddiskVolume4/ProgramData/lck.exe
Files
-
NCHCVS22_2024-05-26_02_47_15.431.zip.zip
Password: Infected!!!
-
Device/HarddiskVolume4/ProgramData/lck.exe.exe windows:5 windows x86 arch:x86
Password: Infected!!!
3aee5e872c96d4317cae38099830979c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mpr
WNetOpenEnumA
WNetCloseEnum
WNetEnumResourceA
WNetGetLastErrorA
kernel32
WaitForMultipleObjects
Sleep
GetFileSizeEx
WriteFile
ReadFile
SetFilePointerEx
CloseHandle
GetTickCount
GetDiskFreeSpaceExW
CreateFileW
FindFirstFileW
FindNextFileW
MoveFileW
GlobalMemoryStatusEx
GetCurrentProcessId
ExitProcess
GetStdHandle
GetSystemTime
GetSystemInfo
CreateMutexA
GetLogicalDriveStringsA
GetCommandLineW
GetDriveTypeA
QueryDosDeviceA
FindFirstVolumeA
FindNextVolumeA
FindVolumeClose
WaitForSingleObject
AllocConsole
lstrlenA
CreateFileA
GetTimeFormatA
GetDateFormatA
GetProcAddress
OpenProcess
GetCurrentProcess
TerminateProcess
ExitThread
TlsAlloc
TlsGetValue
TlsSetValue
CreateProcessA
CreateToolhelp32Snapshot
Process32First
Process32Next
TerminateThread
SetEvent
RtlUnwind
GetModuleHandleExW
GetCPInfo
GetOEMCP
IsValidCodePage
LeaveCriticalSection
DeleteCriticalSection
EnterCriticalSection
InitializeCriticalSection
GetLastError
GetCurrentThreadId
CreateThread
RaiseException
GetVolumePathNamesForVolumeNameA
CreateEventA
MultiByteToWideChar
WideCharToMultiByte
SetLastError
GetACP
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetStringTypeW
DecodePointer
HeapFree
GetModuleHandleW
HeapAlloc
FreeLibrary
LoadLibraryExW
LCMapStringW
user32
wvsprintfA
wsprintfA
shell32
SHEmptyRecycleBinA
SHGetSpecialFolderPathA
CommandLineToArgvW
crypt32
CryptStringToBinaryA
advapi32
OpenSCManagerA
EnumServicesStatusA
ControlService
CloseServiceHandle
CryptEncrypt
CryptImportKey
CryptDestroyKey
CryptReleaseContext
CryptAcquireContextA
OpenServiceA
Sections
.text Size: 59KB - Virtual size: 59KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
manifest.json