Static task
static1
Behavioral task
behavioral1
Sample
699c9a5518a60810e85c83a19a58b080.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
699c9a5518a60810e85c83a19a58b080.exe
Resource
win10v2004-20231215-en
General
-
Target
699c9a5518a60810e85c83a19a58b080
-
Size
55KB
-
MD5
699c9a5518a60810e85c83a19a58b080
-
SHA1
23f43047b66c24607d67729bd7c0ff93f52b44b8
-
SHA256
04c0747a4ffdd2559b85d412125e0db8e4537ac1f8952c46a9898637c09a17db
-
SHA512
e6a5211d20b335791ce79e6856f6c8da54c0eb266017b4b7153502ac2b2157bb3438beb04126ab7e7cdb4bd2b0beb904edf7d688db5cd41f9f7335efad810f62
-
SSDEEP
1536:b9/+qo7X7Q1N4PpQ2iHzNb3vSkdaZcPvQRcCem:blJ0EIRQ2iJ5daiPvQR6m
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 699c9a5518a60810e85c83a19a58b080
Files
-
699c9a5518a60810e85c83a19a58b080.exe windows:4 windows x86 arch:x86
c99cfe2bd8dd60b527e3ce7bf71b8bf8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
CloseHandle
DeviceIoControl
CreateFileW
GetSystemDirectoryA
GetVolumeInformationA
GetTempPathA
ExitProcess
TerminateProcess
SetProcessPriorityBoost
SetThreadPriority
GetCurrentThread
SetPriorityClass
GetCurrentProcess
GetEnvironmentVariableA
GetShortPathNameA
GetModuleFileNameA
IsBadWritePtr
GetComputerNameA
WriteFile
lstrlenA
GetVersionExA
CreateProcessA
shell32
ShellExecuteExA
SHChangeNotify
msvcrt
sprintf
_snprintf
srand
time
strncat
??3@YAXPAX@Z
rand
atoi
_except_handler3
strncpy
_strdup
__CxxFrameHandler
_itoa
msvcp60
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_Xlen@std@@YAXXZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
wininet
HttpQueryInfoA
InternetOpenUrlA
InternetOpenA
InternetReadFile
InternetCloseHandle
Sections
.text Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 51KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE