Static task
static1
Behavioral task
behavioral1
Sample
cc013a3392e4442214c76d0615491520N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cc013a3392e4442214c76d0615491520N.exe
Resource
win10v2004-20240802-en
General
-
Target
cc013a3392e4442214c76d0615491520N
-
Size
88KB
-
MD5
cc013a3392e4442214c76d0615491520
-
SHA1
c993633f59150d534ccee414a49bb9a7462b715f
-
SHA256
610622aa5921b183e00f499414c68cfd48bef0ed48b69ab8cb296922725be733
-
SHA512
433740e1b019bf01f775abe334cbbca2d38a41452e0e156a1003dc75577548750fc40f686dc5f258399dc509d5ac837741d4e97d6775d551435789f22c9f2a83
-
SSDEEP
1536:GdWvtNFN+F+EchVsM/Vycyq1h6MtVYTjipvF2wI/KR11JdNqNY4X9D6:IW1NWcyq1hnbYvQd26xU/m
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cc013a3392e4442214c76d0615491520N
Files
-
cc013a3392e4442214c76d0615491520N.exe windows:4 windows x86 arch:x86
042d0fea2e92059b2a53ee91960ce9d3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetMessageA
RegisterClassExA
TranslateMessage
LoadIconA
LoadStringA
DispatchMessageA
BeginPaint
GetClientRect
EndPaint
PostQuitMessage
SetFocus
DestroyWindow
SendMessageA
PostMessageA
DefWindowProcA
CreateWindowExA
ShowWindow
LoadCursorA
UpdateWindow
kernel32
ExitProcess
HeapAlloc
GetCommandLineA
GetStartupInfoA
GetProcessHeap
lstrcpynA
LoadLibraryA
CreateDirectoryA
WriteProcessMemory
GetModuleHandleA
comctl32
ord17
wtsapi32
WTSEnumerateProcessesA
WTSLogoffSession
WTSQuerySessionInformationA
WTSWaitSystemEvent
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 872B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ