Static task
static1
Behavioral task
behavioral1
Sample
Virus.Hijack.ATA_virussign.com_cddd020c744201f9e4603a717b74c9a4.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Virus.Hijack.ATA_virussign.com_cddd020c744201f9e4603a717b74c9a4.exe
Resource
win10v2004-20240802-en
General
-
Target
Virus.Hijack.ATA_virussign.com_cddd020c744201f9e4603a717b74c9a4.exe
-
Size
1.2MB
-
MD5
cddd020c744201f9e4603a717b74c9a4
-
SHA1
dc2dceaedb2a515a639562fb1c32f44358f66ef9
-
SHA256
274db666e63ce4b9f9298ce365c789960e1f0c7074af71db28f7fb4c3b326bfb
-
SHA512
3887a364cb85556ad0377a65cc1775fc556587c13548c05c4c44343ea9b0fd91c613b3ea6c058437929ffc2e357890b195b007fcbfac8524b37cee6d72fbf8a1
-
SSDEEP
24576:CmgYR4/eB8bxsSDpX4yb8eifYllLdIjxQSQHiF44:LpR4/ehqd2foLdq24
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Virus.Hijack.ATA_virussign.com_cddd020c744201f9e4603a717b74c9a4.exe
Files
-
Virus.Hijack.ATA_virussign.com_cddd020c744201f9e4603a717b74c9a4.exe.exe windows:4 windows x86 arch:x86
7547cd08a992b687c417434c3b5c7770
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
user32
GetKeyboardType
advapi32
RegQueryValueExA
oleaut32
SysFreeString
version
VerQueryValueA
gdi32
UnrealizeObject
comctl32
ImageList_SetIconSize
wininet
InternetGetConnectedState
Sections
CODE Size: 1.2MB - Virtual size: 23.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 34KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE