Static task
static1
Behavioral task
behavioral1
Sample
1d70b0f023cfce1af3f80400d9623cdc.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1d70b0f023cfce1af3f80400d9623cdc.exe
Resource
win10v2004-20231222-en
General
-
Target
1d70b0f023cfce1af3f80400d9623cdc
-
Size
628KB
-
MD5
1d70b0f023cfce1af3f80400d9623cdc
-
SHA1
79b9a8f4c19378a7ed5ac8f949a07ec9f353098f
-
SHA256
3a41f1916f7557383ffbc2e1e2b134eb575b59559b4dd5acb6456c6ad8223c59
-
SHA512
425dd16bc471ab932f38a1b322d199a9c474c041d23b97dc91a71f5c4d48b5ff10180ceb9cf23feadf882abc80d8ec8c5196f91d8ab377b1e3bea91d51270e7a
-
SSDEEP
12288:5AyockWTM7TUNIUh389bIR/quHpPCFf3ZfL8DlTAthdudGBqB6WejIpYQHw3oHLQ:MckWT8S89be/q+CbwhTkhdMGBqB6WejR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1d70b0f023cfce1af3f80400d9623cdc
Files
-
1d70b0f023cfce1af3f80400d9623cdc.exe windows:4 windows x86 arch:x86
823d5cf59e6c081b5072d800ad593718
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ImageList_DragLeave
InitCommonControlsEx
ImageList_DragEnter
kernel32
InterlockedDecrement
EnterCriticalSection
MultiByteToWideChar
GetLastError
TlsSetValue
GetThreadPriority
GetOEMCP
RtlUnwind
ConnectNamedPipe
WideCharToMultiByte
GetUserDefaultLCID
LoadLibraryA
SetComputerNameA
DeleteFiber
ExitProcess
HeapSize
DeleteCriticalSection
GetCurrentProcess
CompareStringA
GetLongPathNameW
GetConsoleOutputCP
SetConsoleCursorInfo
VirtualFree
FreeEnvironmentStringsA
SetStdHandle
FreeLibrary
EnumSystemLocalesA
GetThreadTimes
WaitForMultipleObjects
CloseHandle
GetVersionExA
ExitThread
InitializeCriticalSection
GetModuleFileNameW
TlsFree
WriteConsoleW
SetEnvironmentVariableA
EnumTimeFormatsW
TlsGetValue
FreeEnvironmentStringsW
GetCommandLineA
ReadFile
GetProcAddress
Sleep
IsValidCodePage
LCMapStringW
SetCurrentDirectoryW
LeaveCriticalSection
HeapCreate
VirtualAlloc
GetCommandLineW
GetSystemTimeAsFileTime
GetEnvironmentStringsW
RemoveDirectoryW
GetACP
GetConsoleMode
OpenMutexA
FillConsoleOutputAttribute
FlushFileBuffers
GetTimeZoneInformation
CreateProcessW
GetProcessHeap
GetModuleHandleA
GetConsoleCP
CreateFileA
CreateMutexA
WriteConsoleOutputCharacterW
FindFirstFileA
GetStringTypeW
InterlockedExchange
FindAtomW
GetCurrentProcessId
ReadConsoleInputA
GetLogicalDriveStringsA
UnhandledExceptionFilter
GetStartupInfoA
GetShortPathNameW
GetModuleFileNameA
GetTickCount
GetDriveTypeW
GetDateFormatA
GlobalSize
HeapDestroy
GetLocaleInfoA
SetFilePointer
GetStartupInfoW
GetCurrentThreadId
GetCPInfo
GetStdHandle
WriteFile
SetLastError
IsDebuggerPresent
IsValidLocale
TlsAlloc
SetConsoleCtrlHandler
GetTimeFormatA
QueryPerformanceCounter
ReadConsoleOutputA
GetEnvironmentStrings
LCMapStringA
SetHandleCount
SetUnhandledExceptionFilter
GetFullPathNameA
CreateEventA
TerminateProcess
VirtualQuery
GetCurrentThread
CompareStringW
HeapAlloc
GetLocaleInfoW
GetFileType
HeapFree
HeapReAlloc
InterlockedIncrement
WriteConsoleA
GetStringTypeA
user32
RealGetWindowClass
LoadBitmapA
DefFrameProcW
DrawMenuBar
LoadKeyboardLayoutW
ModifyMenuW
ChangeDisplaySettingsA
GetSubMenu
SetWindowsHookExW
GetSystemMenu
SetDlgItemTextA
RegisterClassA
GetKeyNameTextA
DispatchMessageA
CascadeChildWindows
CreateIcon
RegisterClassExA
EndDeferWindowPos
UnhookWinEvent
CopyIcon
InvalidateRgn
ShowOwnedPopups
TrackPopupMenuEx
GetWindowTextW
GetAncestor
CallMsgFilter
TileChildWindows
DlgDirListComboBoxW
RegisterWindowMessageA
GetWindowModuleFileNameA
UnregisterHotKey
Sections
.text Size: 196KB - Virtual size: 194KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 252KB - Virtual size: 250KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 116KB - Virtual size: 123KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 60KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ