Static task
static1
Behavioral task
behavioral1
Sample
cc4e57b52e0a3ba33b2f5fe619867903f2df53dd2851304e25aac776ded86875.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
cc4e57b52e0a3ba33b2f5fe619867903f2df53dd2851304e25aac776ded86875.exe
Resource
win10v2004-20240704-en
General
-
Target
cc4e57b52e0a3ba33b2f5fe619867903f2df53dd2851304e25aac776ded86875
-
Size
512KB
-
MD5
4dfafbfcdd4460dd71770163766c8044
-
SHA1
2edd26c69c5f094e4d520ea3deb6633f5b98bbea
-
SHA256
cc4e57b52e0a3ba33b2f5fe619867903f2df53dd2851304e25aac776ded86875
-
SHA512
f41887ccd585a793172768ae50bca78917ce0c3035f094551460df28a397954de6971447038299cfde76e2e1148162d098f0656bf7ff940b150920fb90be22ce
-
SSDEEP
12288:wi1x55UIEhlCXvkXVg8IBjLvl8NLrcgIHMlY:BGIEuvQERvWxrctHMlY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cc4e57b52e0a3ba33b2f5fe619867903f2df53dd2851304e25aac776ded86875
Files
-
cc4e57b52e0a3ba33b2f5fe619867903f2df53dd2851304e25aac776ded86875.exe windows:1 windows x86 arch:x86
187553847b5ea54b105cce03f3a97423
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
iphlpapi
GetAdaptersInfo
kernel32
GetModuleHandleA
GetProcAddress
CloseHandle
RtlUnwind
user32
GetCursorInfo
crtdll
__GetMainArgs
exit
raise
signal
setupapi
SetupDiOpenDevRegKey
advapi32
RegOpenKeyExW
RegSetValueExW
RegQueryValueExW
RegCloseKey
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 40B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 120KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 844B - Virtual size: 844B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc2 Size: 300B - Virtual size: 300B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE