Static task
static1
Behavioral task
behavioral1
Sample
70f179bb441039335455500d77c57c33298cf81d2733abacaed5d217736ae94b.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
70f179bb441039335455500d77c57c33298cf81d2733abacaed5d217736ae94b.exe
Resource
win10v2004-20230915-en
General
-
Target
70f179bb441039335455500d77c57c33298cf81d2733abacaed5d217736ae94b
-
Size
566KB
-
MD5
fc2a6a9fa23a63764ad76170ae134ec9
-
SHA1
556d901da68e3953e3b4f7c0c9b3fa39bab87ec5
-
SHA256
70f179bb441039335455500d77c57c33298cf81d2733abacaed5d217736ae94b
-
SHA512
f7fe8d5127322da94fe16bd7ec5cd9a2f7ed3931aaa1a98517d674594b642de7691ff28a7a046c547bc35bae5111a0ea5ba963b225f911796c2fb6bf0ee57048
-
SSDEEP
12288:nGtlqs4VzM+LUwuyevOh+x6Bls+LtQMwxd0oO596qGewPhwp:nGtlqBVzM+5emh+YBls+5bwxaT6qG9wp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 70f179bb441039335455500d77c57c33298cf81d2733abacaed5d217736ae94b
Files
-
70f179bb441039335455500d77c57c33298cf81d2733abacaed5d217736ae94b.exe windows:6 windows x64
6ac5899b078ea95dd5e40d26e7372b43
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
SetDllDirectoryW
MoveFileW
CopyFileW
FreeLibrary
SetThreadLocale
FindFirstFileExW
SetLastError
EnterCriticalSection
GetCurrentProcess
LeaveCriticalSection
InitializeCriticalSection
WaitForSingleObject
CreateFileW
GetSystemDirectoryW
GetLastError
GetUserDefaultLCID
LoadLibraryW
DeleteCriticalSection
GetCurrentProcessId
GetModuleHandleW
GetTickCount
GetStdHandle
WriteConsoleA
WriteFile
OutputDebugStringA
GetCurrentThreadId
AttachConsole
OutputDebugStringW
WriteConsoleW
GetFileType
ReadFile
GetFileSizeEx
SetFileTime
UnmapViewOfFile
GetFileAttributesExW
CreateFileMappingA
MoveFileExW
GetFileSize
MapViewOfFile
GetFileTime
VirtualProtect
GetTempPathW
Sleep
SetEvent
GetVersionExA
GetEnvironmentStringsW
MultiByteToWideChar
WideCharToMultiByte
CreateProcessW
RaiseException
GetSystemInfo
VirtualQuery
LoadLibraryExA
GetStringTypeW
CompareStringEx
InitializeCriticalSectionEx
EncodePointer
DecodePointer
LCMapStringEx
GetCPInfo
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
InitializeCriticalSectionAndSpinCount
ResetEvent
WaitForSingleObjectEx
CreateEventW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwindEx
RtlPcToFileHeader
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
GetModuleHandleExW
HeapFree
HeapAlloc
HeapReAlloc
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
LCMapStringW
GetLocaleInfoW
IsValidLocale
EnumSystemLocalesW
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
FreeEnvironmentStringsW
SetStdHandle
GetProcessHeap
SetFilePointerEx
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
HeapSize
ReadConsoleW
SetEndOfFile
GetEnvironmentVariableW
GetProcAddress
SetCurrentDirectoryW
GetCurrentDirectoryW
CloseHandle
DeleteFileW
GetFileAttributesW
FindClose
GetModuleFileNameW
RemoveDirectoryW
FindNextFileW
GetFullPathNameW
GetCommandLineW
FindFirstFileW
ExitProcess
CreateDirectoryW
Sections
.text Size: 392KB - Virtual size: 392KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 124KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ