Static task
static1
Behavioral task
behavioral1
Sample
70e7b61078302303667d98b71c360a8b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
70e7b61078302303667d98b71c360a8b.exe
Resource
win10v2004-20231222-en
General
-
Target
70e7b61078302303667d98b71c360a8b
-
Size
368KB
-
MD5
70e7b61078302303667d98b71c360a8b
-
SHA1
6c196e501fb549d788d39b11e5d2e04adf08ce3b
-
SHA256
e280ae2f1676136eb7c4af71657e59d6ef456cbc8220c489fd7d2789fb47b065
-
SHA512
a34e3ecf262b74254865f077fc410e50cb005914bd495bb6c61939aa950d5ca753072452a26da7863f900e69b2b72bc45c55e9a740ccb8e39f1d456789f03f2d
-
SSDEEP
6144:mS8WXivXWk0qeOhmwPrYohOR9QUrIxX/FVqc7h77R0rpKo85cOo:mM6XFpLh1Pr9hOR9QcIxX/fqc7h7Krsq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 70e7b61078302303667d98b71c360a8b
Files
-
70e7b61078302303667d98b71c360a8b.exe windows:4 windows x86 arch:x86
1a05f326eaa74878fdf8183271d9c333
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
wininet
InternetCloseHandle
InternetReadFile
HttpOpenRequestA
InternetConnectA
InternetOpenA
InternetGetConnectedState
HttpQueryInfoA
HttpSendRequestA
comctl32
ord17
wsock32
listen
setsockopt
closesocket
shutdown
bind
gethostbyname
htons
socket
accept
send
WSAGetLastError
__WSAFDIsSet
select
recv
WSASetLastError
WSAStartup
ioctlsocket
connect
kernel32
GetStartupInfoA
GetCurrentProcess
GetSystemDirectoryA
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
lstrlenW
GetModuleFileNameA
WideCharToMultiByte
GetSystemTimeAsFileTime
Sleep
CreateDirectoryA
RemoveDirectoryA
SetEvent
OpenEventA
GetVolumeInformationA
GetVersionExA
GetUserDefaultLangID
GetWindowsDirectoryA
SetFileAttributesA
GetFileAttributesA
WriteFile
GetTempPathA
WritePrivateProfileStringA
FreeLibrary
GetProcAddress
LoadLibraryA
WaitForSingleObject
CreateProcessA
lstrcmpiA
ReadFile
CompareFileTime
GetTimeZoneInformation
GetDiskFreeSpaceExA
GetDiskFreeSpaceA
GetLastError
FindClose
FindNextFileA
FindFirstFileA
HeapFree
HeapAlloc
GetProcessHeap
GetLocalTime
OutputDebugStringA
EnterCriticalSection
LeaveCriticalSection
CopyFileA
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetLocaleInfoW
SetEndOfFile
SetConsoleCtrlHandler
IsBadCodePtr
IsBadReadPtr
GetStringTypeW
GetStringTypeA
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetSystemInfo
VirtualProtect
VirtualQuery
GetOEMCP
GetACP
GetEnvironmentStringsW
FreeEnvironmentStringsW
CloseHandle
DeleteFileA
GetTickCount
GetTempFileNameA
GetModuleHandleA
CreateFileA
HeapSize
SetStdHandle
GetFileType
SetHandleCount
GetStdHandle
HeapDestroy
HeapCreate
FileTimeToLocalFileTime
GetFileInformationByHandle
MoveFileExA
PeekNamedPipe
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
IsBadWritePtr
VirtualAlloc
TerminateProcess
HeapReAlloc
SetUnhandledExceptionFilter
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThread
SetLastError
FindFirstFileW
DeleteFileW
FindNextFileW
LocalFree
LocalAlloc
OpenProcess
WaitForMultipleObjects
ResetEvent
ReleaseMutex
ReleaseSemaphore
CreateEventA
CreateMutexA
OpenMutexA
CreateSemaphoreA
QueryPerformanceFrequency
QueryPerformanceCounter
SystemTimeToFileTime
FileTimeToSystemTime
GetSystemTime
GetDateFormatA
GetTimeFormatA
UnmapViewOfFile
GetComputerNameA
GetCurrentProcessId
MapViewOfFile
CreateFileMappingA
GetVersion
GetShortPathNameA
WritePrivateProfileSectionA
GetPrivateProfileSectionA
FormatMessageA
GetModuleFileNameW
LoadLibraryExA
Process32Next
Process32First
CreateToolhelp32Snapshot
SetFilePointer
InterlockedExchange
MultiByteToWideChar
lstrlenA
ExitProcess
RtlUnwind
RaiseException
FlushFileBuffers
SetFileTime
LocalFileTimeToFileTime
ExitThread
GetCurrentThreadId
CreateThread
GetCommandLineA
LCMapStringA
LCMapStringW
GetCPInfo
FatalAppExitA
TlsAlloc
VirtualFree
user32
DispatchMessageA
GetSystemMetrics
LoadImageA
ExitWindowsEx
SetForegroundWindow
KillTimer
GetClientRect
SetWindowTextA
PostMessageA
SetWindowPos
LoadStringA
PostQuitMessage
GetDesktopWindow
GetWindowRect
MoveWindow
DestroyWindow
DefWindowProcA
CreateWindowExA
ShowWindow
UpdateWindow
LoadIconA
LoadCursorA
RegisterClassExA
GetMessageA
TranslateAcceleratorA
TranslateMessage
GetDC
ReleaseDC
LoadMenuA
advapi32
AllocateAndInitializeSid
EqualSid
FreeSid
RegOpenKeyExA
RegDeleteValueA
RegCreateKeyA
RegSetValueExA
RegQueryValueExA
RegOpenKeyA
SetSecurityInfo
SetFileSecurityA
IsValidSid
RegEnumKeyA
RegEnumValueA
GetSidSubAuthorityCount
GetSidSubAuthority
SetTokenInformation
RegEnumKeyExA
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
RegCreateKeyExA
RegDeleteKeyA
InitializeSecurityDescriptor
GetLengthSid
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
RegSetKeySecurity
RegSaveKeyA
RegFlushKey
AdjustTokenPrivileges
LookupPrivilegeValueA
RegCloseKey
OpenProcessToken
DuplicateTokenEx
CreateProcessAsUserA
GetTokenInformation
ole32
OleInitialize
CoTaskMemFree
StringFromGUID2
OleRun
CoCreateInstance
oleaut32
CreateErrorInfo
VariantClear
VariantInit
SysFreeString
LoadTypeLi
DispGetIDsOfNames
VariantChangeType
SysAllocString
GetErrorInfo
SetErrorInfo
shlwapi
SHCopyKeyA
gdi32
GetDeviceCaps
shell32
SHGetSpecialFolderPathA
Sections
.text Size: 267KB - Virtual size: 267KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 50KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ