Static task
static1
Behavioral task
behavioral1
Sample
dcc32c62833e8e79cc6de1e61c627d20N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
dcc32c62833e8e79cc6de1e61c627d20N.exe
Resource
win10v2004-20240802-en
General
-
Target
dcc32c62833e8e79cc6de1e61c627d20N.exe
-
Size
1.2MB
-
MD5
dcc32c62833e8e79cc6de1e61c627d20
-
SHA1
7acbc4313b56677a77fea9640936a98c909dfaf4
-
SHA256
6f13e5c1cce080870dbd1d4eb8cb7259df7addcf3b1ca68c8008e75174d957d4
-
SHA512
66ee12d5eec0721d7ec67a1fd3db8f3c165856a3d545496a41ce19b872188d7c0e9e63482d59178afddc868e2e9739c20b5c47ef6cc8e54dc6e90a764a503ee5
-
SSDEEP
12288:K636so24cmU4ANhxVbrMndcohGTZiARYL2bcAUIBoJG:36so2h94A9Vcn2oUdiARLkg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dcc32c62833e8e79cc6de1e61c627d20N.exe
Files
-
dcc32c62833e8e79cc6de1e61c627d20N.exe.exe windows:4 windows x64 arch:x64
dd874adf4faa7586fcf8de946d0545eb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
PDB Paths
Imports
msys-ncursesw6
_nc_align_termtype
_nc_doalloc
_nc_err_abort
_nc_find_entry
_nc_first_db
_nc_first_name
_nc_get_hash_table
_nc_head
_nc_last_db
_nc_next_db
_nc_read_entry2
_nc_read_file_entry
_nc_rootname
_nc_set_source
_nc_tail
_nc_tracing
_nc_trim_sgr0
_nc_user_definable
_nc_warning
boolcodes
boolfnames
boolnames
curses_version
numcodes
numfnames
numnames
strcodes
strfnames
strnames
use_extended_names
msys-ticw6
_nc_capcmp
_nc_disable_period
_nc_entry_match
_nc_infotocap
_nc_read_entry_source
_nc_resolve_uses2
_nc_strict_bsd
_nc_tic_expand
_nc_write_object
msys-2.0
__cxa_atexit
__getreent
__locale_ctype_ptr
__main
_dll_crt0
_impure_ptr
atoi
calloc
cygwin_internal
dll_dllcrt0
exit
fprintf
fputc
fputs
free
freopen
fwrite
getenv
getopt
malloc
memcpy
msys_detach_dll
optarg
optind
perror
posix_memalign
printf
putchar
puts
realloc
sprintf
stpcpy
strcat
strchr
strcmp
strcpy
strlen
strncmp
strncpy
strspn
strtok
strtol
kernel32
GetModuleHandleA
Sections
.text Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 160B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.buildid Size: 512B - Virtual size: 53B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 1024B - Virtual size: 624B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 1024B - Virtual size: 632B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 672B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1.2MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE