Static task
static1
Behavioral task
behavioral1
Sample
70972aacaf3d90280380350e96f41494.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
70972aacaf3d90280380350e96f41494.exe
Resource
win10v2004-20231222-en
General
-
Target
70972aacaf3d90280380350e96f41494
-
Size
778KB
-
MD5
70972aacaf3d90280380350e96f41494
-
SHA1
117537f186592996fa188c108431194df8ecc593
-
SHA256
47bf9240ca88f0eb8aacc57bbc1fc88a7d287ed0a42139457ae4ab26e26aab5b
-
SHA512
edd2dac64c9c526545745b8baed996ffec9a1e126db1295abbae58d2b8bf81fcb06441d3d7b84ce420a62be40fcc733499086776066db8428424b4b09be823b7
-
SSDEEP
12288:tEgYo7G9zMnxfMxUAZ2vLK6c1eMu4kAOugPeOm08maXSSm7Bru/9hjyv:Uo7m2JMxUTK6oF1nFg2l02CXdrGjyv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 70972aacaf3d90280380350e96f41494
Files
-
70972aacaf3d90280380350e96f41494.exe windows:4 windows x86 arch:x86
3447fed2c8ca029ad56c5f12b9aa0c03
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetProcessHeap
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCommandLineW
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
ExitProcess
DeleteCriticalSection
InitializeCriticalSection
LocalAlloc
LocalFree
GlobalSize
GlobalLock
GlobalUnlock
GlobalAlloc
GlobalFree
SizeofResource
LoadResource
LockResource
GetVersionExA
msvcrt
_controlfp
_initterm
__p__fmode
__set_app_type
difftime
__setusermatherr
_amsg_exit
_initterm
_wcmdln
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
__p__commode
?terminate@@YAXXZ
user32
DrawTextW
GetIconInfo
GetSysColor
GetDC
ReleaseDC
newdev
UpdateDriverForPlugAndPlayDevicesW
Sections
.text Size: 459KB - Virtual size: 459KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 300KB - Virtual size: 300KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ