Static task
static1
Behavioral task
behavioral1
Sample
70ca0b742a37dfadea23787d11be33c1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
70ca0b742a37dfadea23787d11be33c1.exe
Resource
win10v2004-20231215-en
General
-
Target
70ca0b742a37dfadea23787d11be33c1
-
Size
50KB
-
MD5
70ca0b742a37dfadea23787d11be33c1
-
SHA1
ee7efa40966c3e14cf85b98718b4b5467aa2d1ba
-
SHA256
ddcf8558f6f17bc1210455d1120b04e80a6dc52ff4acb83693a76c830a49a1a0
-
SHA512
cebb6faf6d0b11447db03512d8359617e3c0ccf987b2a8ee151469a29f07bb572d54fdc474c31c5290b44474c2357660c4633f43f3868879aa9d8d51aeec88e8
-
SSDEEP
1536:UBhWidHYuRs/2Nk20AJsm1T8iszzA1ZE:WthCKMJA1ZE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 70ca0b742a37dfadea23787d11be33c1
Files
-
70ca0b742a37dfadea23787d11be33c1.exe windows:4 windows x86 arch:x86
ba7c12ae948b38eba668ea5bbb3a711e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersionExA
InitializeCriticalSection
DeleteCriticalSection
LoadResource
SizeofResource
FindResourceA
EnumResourceNamesA
GetModuleHandleA
GetModuleFileNameA
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
lstrlenA
GetSystemDefaultLCID
GetThreadLocale
SleepEx
GetProcAddress
LoadLibraryA
GetLastError
SetProcessWorkingSetSize
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetStartupInfoA
GetLocaleInfoA
GetACP
ExitProcess
InterlockedExchange
GetSystemTimeAsFileTime
user32
SetWindowTextA
SetClassLongA
GetSystemMetrics
EnableWindow
LoadIconA
FindWindowA
GetMessageA
DispatchMessageA
TranslateMessage
MessageBoxW
MessageBoxA
SetFocus
SetForegroundWindow
PostQuitMessage
SetWindowTextW
PostMessageA
SetWindowPos
RegisterWindowMessageA
SendMessageA
ShowWindow
CreateWindowExA
ole32
CLSIDFromProgID
CoUninitialize
CoInitialize
CreateStreamOnHGlobal
CoCreateInstance
oleaut32
SysAllocStringLen
SysStringByteLen
SysAllocStringByteLen
SysAllocString
VariantChangeType
VariantClear
VariantInit
SysFreeString
msvcp71
?_Nomemory@std@@YAXXZ
?push_back@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEXD@Z
?_Xran@_String_base@std@@QBEXXZ
?begin@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE?AViterator@12@XZ
?end@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE?AViterator@12@XZ
??$?8DU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??$?MDU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@0@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
?erase@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@II@Z
comctl32
ord413
ord410
ord412
msvcr71
??0exception@@QAE@XZ
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_amsg_exit
_acmdln
exit
_cexit
_ismbblead
_XcptFilter
_exit
_c_exit
_onexit
__dllonexit
?terminate@@YAXXZ
??1type_info@@UAE@XZ
__security_error_handler
_callnewh
memset
memmove
tolower
wcscpy
_purecall
wcslen
_stat
_except_handler3
sprintf
free
??0exception@@QAE@ABV0@@Z
__CxxFrameHandler
_CxxThrowException
??3@YAXPAX@Z
??1exception@@UAE@XZ
malloc
fclose
fread
fopen
_controlfp
Sections
.text Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 428B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 148B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE