Static task
static1
Behavioral task
behavioral1
Sample
f70af77b7f077f4fbff749ce3bb3c181.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
f70af77b7f077f4fbff749ce3bb3c181.exe
Resource
win10v2004-20231215-en
General
-
Target
f70af77b7f077f4fbff749ce3bb3c181
-
Size
939KB
-
MD5
f70af77b7f077f4fbff749ce3bb3c181
-
SHA1
a368d4027f9a79de779912a1b1b78c36002efadd
-
SHA256
e09f022fe08aeba6d491a79e2328b4b9d51aede6f321399bd4beba4fa159830c
-
SHA512
84d854d61ac7b6296dd6140bd28631d97f8d12ac3f30d91dd9059918aa55cb8fb6bacbf6d35bac69f1df1763b3d36202fe65a8e7516f56d9c45f7089176154cb
-
SSDEEP
12288:1LerEO3L5Pr/HLS03BiDVxjSzlGu65OTp5YghKo5:1Lk3L5brS6BiDVxoDNT2o
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f70af77b7f077f4fbff749ce3bb3c181
Files
-
f70af77b7f077f4fbff749ce3bb3c181.exe windows:4 windows x86 arch:x86
f58b7292380a072486ac705410341e03
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
kernel32
RtlUnwind
GetSystemTime
GetCurrentDirectoryA
GetLocalTime
GetStartupInfoA
GetCommandLineA
ExitProcess
RaiseException
GetFileType
SetStdHandle
HeapSize
LCMapStringA
LCMapStringW
SetHandleCount
GetStdHandle
GetProcessVersion
GetOEMCP
GetACP
GetCPInfo
IsBadWritePtr
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
HeapDestroy
TlsGetValue
MoveFileExA
GetDiskFreeSpaceA
ReleaseMutex
GetWindowsDirectoryA
GetSystemDirectoryA
ExpandEnvironmentStringsA
RemoveDirectoryA
GetLogicalDriveStringsA
GetDriveTypeA
DeviceIoControl
CreateFileA
GetComputerNameA
GetTimeZoneInformation
GetTempFileNameA
DeleteFileA
GetVolumeInformationA
GetShortPathNameA
GetFileAttributesA
GetTempPathA
lstrcpyA
lstrlenA
FindFirstFileA
CreateDirectoryA
FindClose
GetVersionExA
Sleep
TerminateProcess
OpenProcess
GetCurrentProcess
CloseHandle
HeapAlloc
HeapReAlloc
LocalAlloc
HeapFree
LocalFree
GetLastError
GetProcAddress
FreeLibrary
LoadLibraryA
GetProfileStringA
SizeofResource
SetErrorMode
GlobalReAlloc
LocalReAlloc
TlsSetValue
TlsAlloc
TlsFree
GlobalHandle
LeaveCriticalSection
GlobalFlags
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
MulDiv
GetTickCount
GetCurrentThread
GlobalAlloc
GlobalAddAtomA
GetCurrentThreadId
GlobalGetAtomNameA
GetModuleHandleA
GlobalFindAtomA
GlobalDeleteAtom
FindResourceA
GlobalFree
LockResource
SystemTimeToFileTime
LoadResource
SetFileTime
GetFileSize
LocalFileTimeToFileTime
GetFileTime
GetModuleFileNameA
lstrcmpA
SetLastError
GetFullPathNameA
UnlockFile
lstrcpynA
SetEndOfFile
SetFilePointer
LockFile
FlushFileBuffers
DuplicateHandle
WriteFile
ReadFile
FileTimeToSystemTime
FormatMessageA
FileTimeToLocalFileTime
GlobalUnlock
GlobalLock
InterlockedIncrement
WideCharToMultiByte
InterlockedDecrement
MoveFileA
GetPrivateProfileStringA
WritePrivateProfileStringA
FindNextFileA
InterlockedExchange
GetEnvironmentVariableA
GetVersion
MultiByteToWideChar
SetFileAttributesA
CopyFileA
GetExitCodeProcess
lstrcatA
GlobalMemoryStatus
OpenMutexA
CreateMutexA
WaitForSingleObject
lstrcmpiA
HeapCreate
VirtualFree
VirtualAlloc
user32
EnableMenuItem
ShowWindow
SetWindowTextA
CheckMenuItem
IsDialogMessageA
SendDlgItemMessageA
MapWindowPoints
DispatchMessageA
GetFocus
SetFocus
AdjustWindowRectEx
ScreenToClient
GetMenuState
ModifyMenuA
CopyRect
IsWindowVisible
GetTopWindow
MessageBoxA
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetDlgCtrlID
GetKeyState
DefWindowProcA
CallNextHookEx
GetClassLongA
GetMenuCheckMarkDimensions
LoadBitmapA
GetDC
GetMessageTime
GetMessagePos
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
LoadStringA
RegisterClipboardFormatA
DestroyMenu
ClientToScreen
GetWindowDC
RegisterWindowMessageA
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetNextDlgTabItem
EndDialog
GetActiveWindow
SetActiveWindow
IsWindow
CreateDialogIndirectParamA
DestroyWindow
GetParent
GetWindowLongA
GetDlgItem
IsWindowEnabled
UnhookWindowsHookEx
CharUpperA
wsprintfA
GetWindowTextLengthA
GetWindowTextA
LoadImageA
FillRect
GetSysColor
LoadCursorA
KillTimer
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
GetSystemMenu
AppendMenuA
InvalidateRect
PostQuitMessage
SetCursor
GetCursorPos
ValidateRect
TranslateMessage
GetMessageA
ReleaseDC
SetPropA
GetPropA
CreateWindowExA
SetWindowsHookExA
SetTimer
GetWindowThreadProcessId
FindWindowA
PostMessageA
UpdateWindow
ExitWindowsEx
EnableWindow
LoadIconA
SendMessageA
PeekMessageA
PostThreadMessageA
InflateRect
GetSysColorBrush
PtInRect
GetClassNameA
GrayStringA
DrawTextA
TabbedTextOutA
EndPaint
BeginPaint
CallWindowProcA
RemovePropA
SetMenuItemBitmaps
HideCaret
ShowCaret
UnregisterClassA
DrawFocusRect
DefDlgProcA
ExcludeUpdateRgn
IsWindowUnicode
CharNextA
gdi32
GetTextExtentPointA
CreateDIBitmap
StretchBlt
GetMapMode
CreateCompatibleDC
DPtoLP
GetObjectA
CreateBitmap
GetClipBox
SetTextColor
SetBkColor
PatBlt
SaveDC
DeleteDC
SelectObject
GetStockObject
RestoreDC
SetBkMode
SelectPalette
SetMapMode
OffsetViewportOrgEx
SetViewportExtEx
SetViewportOrgEx
ScaleViewportExtEx
ScaleWindowExtEx
SetWindowExtEx
IntersectClipRect
CreatePalette
GetDeviceCaps
DeleteObject
PtVisible
RectVisible
ExtTextOutA
Escape
TextOutA
BitBlt
RealizePalette
CreateSolidBrush
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
advapi32
LookupAccountSidA
GetUserNameA
RegOpenKeyA
RegOpenKeyExA
RegCreateKeyExA
RegConnectRegistryA
RegCloseKey
RegQueryInfoKeyA
RegQueryValueExA
RegSetValueExA
RegDeleteValueA
RegEnumKeyExA
RegEnumValueA
RegDeleteKeyA
CloseServiceHandle
OpenSCManagerA
InitiateSystemShutdownA
GetTokenInformation
OpenProcessToken
RegUnLoadKeyA
RegLoadKeyA
GetSidSubAuthority
GetSidSubAuthorityCount
GetSidIdentifierAuthority
IsValidSid
LookupAccountNameA
AdjustTokenPrivileges
LookupPrivilegeValueA
shell32
SHFileOperationA
ShellExecuteExA
Shell_NotifyIconA
SHGetMalloc
SHBrowseForFolderA
SHGetPathFromIDListA
comctl32
ord17
oledlg
ord8
ole32
OleRun
OleInitialize
OleIsCurrentClipboard
OleUninitialize
CoCreateInstance
CoFreeUnusedLibraries
CoRegisterMessageFilter
CoRevokeClassObject
OleFlushClipboard
CLSIDFromString
CLSIDFromProgID
oleaut32
VariantClear
SysFreeString
VariantChangeType
SysAllocString
SysStringLen
wsock32
WSAStartup
ioctlsocket
WSACleanup
inet_addr
ntohl
rpcrt4
UuidToStringA
RpcStringFreeA
Sections
.text Size: 476KB - Virtual size: 475KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 68KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 384KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ