Static task
static1
Behavioral task
behavioral1
Sample
720b99c0c073f86a71e1f88a8addd409.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
720b99c0c073f86a71e1f88a8addd409.exe
Resource
win10v2004-20231215-en
General
-
Target
720b99c0c073f86a71e1f88a8addd409
-
Size
136KB
-
MD5
720b99c0c073f86a71e1f88a8addd409
-
SHA1
264c91e3cb11d18e00211b7d0126cd528bbb3a88
-
SHA256
f59416fca8f53eaa4655c34a2da174112649c7d66c90ddb831c39d82efd05cf3
-
SHA512
db9beb1a7dce53093a621fae6f1202de709e2458a7f3bd0abee8e687c50c2569b37373a5b0e6207ce6d99179890583b36708ca9c57adb6a63cbaee40961119fb
-
SSDEEP
3072:4sKWtpV1P2LC+EQJjtzqIgvVsj0oGBBlowW:4sZpzP2WhQJFaVsj0oGBBlo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 720b99c0c073f86a71e1f88a8addd409
Files
-
720b99c0c073f86a71e1f88a8addd409.exe windows:4 windows x86 arch:x86
e4249ffb8689abc105e786013a9ab2e4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc71
ord2540
ord2646
ord2533
ord2991
ord3718
ord3719
ord3709
ord2644
ord3949
ord4486
ord4261
ord572
ord5946
ord3908
ord764
ord762
ord760
ord4541
ord3683
ord4038
ord4014
ord6278
ord3801
ord6276
ord4326
ord2063
ord2018
ord5583
ord3806
ord1010
ord5102
ord6219
ord5382
ord3832
ord1920
ord2931
ord5224
ord5226
ord3948
ord4568
ord5230
ord5213
ord5566
ord2838
ord4481
ord3333
ord566
ord757
ord2248
ord2862
ord1054
ord3830
ord2468
ord2902
ord4035
ord265
ord3641
ord5182
ord4212
ord4735
ord4890
ord2020
ord1671
ord1670
ord1551
ord5912
ord1401
ord5203
ord1599
ord4262
ord3182
ord605
ord354
ord1203
ord6065
ord4580
ord3920
ord5410
ord461
ord462
ord1794
ord1980
ord1296
ord876
ord3934
ord266
ord5235
ord5233
ord2390
ord2400
ord2398
ord2396
ord2392
ord2415
ord2403
ord1614
ord2714
ord4307
ord2835
ord2731
ord2537
ord5200
ord1655
ord1656
ord1964
ord5175
ord1362
ord4967
ord3345
ord6277
ord3802
ord6279
ord1522
ord2172
ord2178
ord2405
ord2387
ord2385
ord2408
ord2413
ord2394
ord2410
ord934
ord930
ord932
ord928
ord923
ord5960
ord1600
ord4282
ord4722
ord3403
ord5214
ord4185
ord6275
ord5073
ord1908
ord5152
ord4244
ord1402
ord3946
ord1617
ord1620
ord1207
ord5915
ord3596
ord3907
ord310
ord297
ord578
ord1084
ord3115
msvcr71
_wcsupr
_wmakepath
??0exception@@QAE@ABV0@@Z
_CxxThrowException
vswprintf
iswdigit
_wtoi
__set_app_type
wcscmp
wcschr
fclose
fgetws
_setmbcp
wcsstr
wcscpy
wcslen
??0exception@@QAE@XZ
??1exception@@UAE@XZ
_wsplitpath
swprintf
free
__CxxFrameHandler
wcsrchr
_wgetenv
wcsncpy
_read
_write
_lseek
_close
memmove
wcsncmp
malloc
_strupr
_splitpath
_makepath
sprintf
_except_handler3
memset
__dllonexit
_onexit
__security_error_handler
??1type_info@@UAE@XZ
?terminate@@YAXXZ
_c_exit
_exit
_XcptFilter
_ismbblead
exit
_acmdln
_amsg_exit
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_controlfp
wcscat
_cexit
kernel32
FileTimeToDosDateTime
WideCharToMultiByte
MultiByteToWideChar
GetModuleFileNameA
LoadLibraryA
CreateSemaphoreA
FindClose
RaiseException
InitializeCriticalSection
DeleteCriticalSection
ExitProcess
GetModuleHandleA
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetLastError
CloseHandle
GetVersionExA
WinExec
InterlockedExchange
InterlockedDecrement
LocalAlloc
GetProcAddress
FreeLibrary
GetACP
user32
MessageBoxA
EnableWindow
PeekMessageA
TranslateMessage
DispatchMessageA
GetWindowLongA
SetWindowLongA
SetWindowTextA
DestroyIcon
OffsetRect
RegisterWindowMessageA
FindWindowA
SetForegroundWindow
advapi32
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
shell32
SHGetSpecialFolderLocation
SHGetMalloc
SHGetDesktopFolder
SHGetPathFromIDListW
comctl32
ord17
shlwapi
PathFileExistsA
ole32
CoTaskMemFree
oleaut32
SysAllocString
SysFreeString
msvcp71
??0?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@PBG@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
?assign@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAEAAV12@PBG@Z
?c_str@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QBEPBGXZ
??0?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@XZ
??1?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@XZ
??4?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAEAAV01@ABV01@@Z
??0?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
Sections
.text Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE