Static task
static1
Behavioral task
behavioral1
Sample
ddec8b3b0197ffdf0de64eeadcd53ceab3c1b0e1e9c993694c2459d64f4fb61d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ddec8b3b0197ffdf0de64eeadcd53ceab3c1b0e1e9c993694c2459d64f4fb61d.exe
Resource
win10v2004-20241007-en
General
-
Target
ddec8b3b0197ffdf0de64eeadcd53ceab3c1b0e1e9c993694c2459d64f4fb61d
-
Size
528KB
-
MD5
35a7e15a1a0353cf771bf0fac039ff6b
-
SHA1
7f45459044af0fc0795e05e0963dd2094f2be604
-
SHA256
ddec8b3b0197ffdf0de64eeadcd53ceab3c1b0e1e9c993694c2459d64f4fb61d
-
SHA512
bc8149bfa289f6889f8246905ccab6579130df7fc428d1caff3ddf668e51afc2ee0501f0bb5403df7a8ad971e57f40fe14785fc4f0c08ae75c670b1d7edb014b
-
SSDEEP
12288:7lcppjKBJ+DF1VS+at8Yc8TCkZIqmqC2N:7OGBJ+DF6T8GTCkwqC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ddec8b3b0197ffdf0de64eeadcd53ceab3c1b0e1e9c993694c2459d64f4fb61d
Files
-
ddec8b3b0197ffdf0de64eeadcd53ceab3c1b0e1e9c993694c2459d64f4fb61d.exe windows:4 windows x86 arch:x86
9e4758d3d6497c0f00dcef75b02b964f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
CreatePropertySheetPageA
PropertySheetA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
kernel32
LocalFree
LocalAlloc
GetLastError
MultiByteToWideChar
GetCurrentProcess
SetFileAttributesA
CopyFileA
CreateDirectoryA
GetTempPathA
ResumeThread
SetPriorityClass
GetCurrentThread
SetThreadPriority
WriteFile
lstrlenA
lstrcpyA
GetWindowsDirectoryA
ReleaseMutex
GetExitCodeProcess
WaitForSingleObject
WideCharToMultiByte
CreateMutexA
RtlUnwind
GetFileAttributesA
HeapFree
HeapAlloc
InterlockedDecrement
InterlockedIncrement
GetCurrentDirectoryA
GetFullPathNameA
HeapReAlloc
ExitProcess
TerminateProcess
GetStartupInfoA
GetCommandLineA
GetVersion
GetCurrentThreadId
TlsSetValue
FindNextFileA
GetModuleHandleA
SetLastError
TlsGetValue
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
CreateProcessA
OpenProcess
HeapCreate
VirtualFree
VirtualAlloc
LCMapStringA
LCMapStringW
GetCPInfo
GetACP
GetOEMCP
HeapSize
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetStringTypeA
GetStringTypeW
SetFilePointer
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadWritePtr
IsBadCodePtr
FindClose
SetStdHandle
FlushFileBuffers
SetEndOfFile
GetLocaleInfoW
CreateFileA
GetFileSize
ReadFile
CloseHandle
lstrcmpiA
GetModuleFileNameA
GetDriveTypeA
GetShortPathNameA
IsDBCSLeadByte
GetPrivateProfileStringA
FindResourceA
LoadResource
LockResource
GetSystemDefaultLangID
MulDiv
LoadLibraryA
GetProcAddress
FreeLibrary
GetDiskFreeSpaceA
GetVolumeInformationA
GetVersionExA
GetSystemDirectoryA
GetTempFileNameA
DeleteFileA
GetPrivateProfileIntA
Sleep
FormatMessageA
SetErrorMode
FindFirstFileA
HeapDestroy
TlsAlloc
GetLocaleInfoA
user32
GetWindowLongA
GetWindowThreadProcessId
TranslateMessage
PeekMessageA
CallWindowProcA
FindWindowA
SetClassLongA
LoadIconA
ExitWindowsEx
wsprintfA
GetWindowTextLengthA
SetCursor
LoadCursorA
BeginPaint
EndPaint
GetKeyboardType
EndDialog
GetWindowTextA
GetDlgItemTextA
DialogBoxParamA
SetDlgItemTextA
GetWindow
IsWindowVisible
IsWindowEnabled
GetActiveWindow
SetWindowPos
GetClientRect
SetFocus
SetTimer
GetMessageA
DispatchMessageA
KillTimer
InvalidateRect
OffsetRect
GetSysColor
CharNextA
SetWindowLongA
SendMessageA
GetDlgItem
EnableWindow
BringWindowToTop
CharPrevA
GetParent
PostMessageA
SetWindowTextA
LoadStringA
MessageBoxA
GetSystemMetrics
FlashWindow
GetWindowRect
ScreenToClient
UpdateWindow
wvsprintfA
GetDC
ShowWindow
ReleaseDC
gdi32
SetBkColor
SetTextColor
GetTextExtentPoint32A
RestoreDC
BitBlt
SelectObject
SaveDC
DeleteDC
SetBkMode
CreateCompatibleBitmap
CreateDIBitmap
CreateCompatibleDC
StretchDIBits
SetBrushOrgEx
UnrealizeObject
SetStretchBltMode
RealizePalette
SelectPalette
CreateFontIndirectA
GetDeviceCaps
CreatePalette
ExtTextOutA
DeleteObject
advapi32
RegOpenKeyExA
CloseServiceHandle
AdjustTokenPrivileges
RegCreateKeyExA
RegFlushKey
OpenProcessToken
RegCloseKey
RegSetValueExA
LookupPrivilegeValueA
OpenSCManagerA
RegQueryValueExA
RegEnumValueA
RegDeleteValueA
shell32
ShellExecuteA
SHGetPathFromIDListA
SHGetMalloc
SHBrowseForFolderA
mpr
WNetCloseEnum
WNetEnumResourceA
WNetOpenEnumA
Sections
.text Size: 117KB - Virtual size: 117KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 380KB - Virtual size: 380KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ