Static task
static1
Behavioral task
behavioral1
Sample
70359401ec451f67a80f174087c603169f66e5c09caf21f31df2097040e1f433.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
70359401ec451f67a80f174087c603169f66e5c09caf21f31df2097040e1f433.exe
Resource
win10v2004-20230915-en
General
-
Target
70359401ec451f67a80f174087c603169f66e5c09caf21f31df2097040e1f433
-
Size
150KB
-
MD5
0d4ad5023bc5521745e6c651be6ad8a1
-
SHA1
0500d538d643508a529feb8a97b3063f5536b5fe
-
SHA256
70359401ec451f67a80f174087c603169f66e5c09caf21f31df2097040e1f433
-
SHA512
734c1dbc6a1e4471468b49ecb95d3e202da734475e37471d3e8a81f3698712fc9178f89babe2a9c3c45ca5fbd6a1eddb1145a3f54fab8cf33cc092d9e4c5dca2
-
SSDEEP
3072:0bic4N2AyHRm0hpph0+hSmJ8vWZjP0vDiHFxi:0bic4NxKRmovg08ve
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 70359401ec451f67a80f174087c603169f66e5c09caf21f31df2097040e1f433
Files
-
70359401ec451f67a80f174087c603169f66e5c09caf21f31df2097040e1f433.exe windows:5 windows x64
b8e8cc7a9c7091a9b83deb8013e9c1e3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
advapi32
RegCreateKeyExW
RegQueryValueExW
RegSetValueExW
RegCloseKey
comctl32
CreateStatusWindowW
InitCommonControlsEx
shell32
ShellAboutW
user32
KillTimer
MessageBoxW
BeginPaint
CallWindowProcW
CheckDlgButton
CheckRadioButton
CreateWindowExW
DefWindowProcW
DestroyWindow
DialogBoxParamW
DispatchMessageW
EnableMenuItem
EnableWindow
EndDialog
EndPaint
GetClientRect
GetDlgItem
GetMenu
GetMessageW
GetSubMenu
GetSysColor
GetSystemMetrics
GetWindowLongPtrW
GetWindowRect
InvalidateRect
IsDlgButtonChecked
LoadAcceleratorsW
LoadCursorW
LoadIconW
LoadStringW
MoveWindow
PostQuitMessage
CopyRect
MessageBoxA
LoadBitmapA
InflateRect
SendMessageA
OffsetRect
GetParent
DrawIconEx
SetCapture
ReleaseCapture
SetWindowLongPtrA
RegisterClassExA
PtInRect
LoadCursorA
GetWindowLongPtrA
DefWindowProcA
CreateWindowExA
FillRect
SetRect
ReleaseDC
IntersectRect
GetDC
WinHelpW
UpdateWindow
TranslateMessage
TranslateAcceleratorW
ShowWindow
SetWindowPos
SetWindowLongPtrW
SetTimer
SendMessageW
RegisterClassW
PostMessageW
gdi32
SetBrushOrgEx
PatBlt
CreatePatternBrush
CreatePalette
CreateBitmap
SetTextColor
MoveToEx
LineTo
GetTextExtentPoint32A
SelectPalette
SelectClipRgn
RealizePalette
GetObjectA
GetClipRgn
FillRgn
CreateSolidBrush
CreateRectRgn
CombineRgn
SetPixel
GetPixel
ExcludeClipRect
DeleteObject
DeleteDC
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
SetBkColor
ExtTextOutA
StretchBlt
SelectObject
Rectangle
GetStockObject
CreatePen
msvcrt
??3@YAXPEAX@Z
srand
__lconv_init
signal
_onexit
__dllonexit
_unlock
_lock
calloc
_wcmdln
__winitenv
_initterm
_fpreset
_cexit
exit
__set_app_type
__wgetmainargs
_amsg_exit
__setusermatherr
malloc
memcpy
sqrt
fabs
abs
??2@YAPEAX_K@Z
rand
swprintf
wcscat
memset
kernel32
GetModuleFileNameW
GetModuleHandleW
GetProcessHeap
TlsGetValue
LeaveCriticalSection
InitializeCriticalSection
GetLastError
EnterCriticalSection
DeleteCriticalSection
LoadLibraryW
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
SetUnhandledExceptionFilter
GetStartupInfoW
GetProcAddress
LoadLibraryA
GetVersion
FreeLibrary
lstrlenA
Sleep
GetModuleHandleA
WaitForSingleObject
ReleaseMutex
CreateMutexA
CloseHandle
lstrcpyW
HeapFree
HeapAlloc
GetTickCount
Sections
.text Size: 55KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 84KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ