Static task
static1
Behavioral task
behavioral1
Sample
14571f2a78bfb401fe9aa07f02be2ca3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
14571f2a78bfb401fe9aa07f02be2ca3.exe
Resource
win10v2004-20231215-en
General
-
Target
14571f2a78bfb401fe9aa07f02be2ca3
-
Size
33KB
-
MD5
14571f2a78bfb401fe9aa07f02be2ca3
-
SHA1
000945d132e76054f5beb40329deadf8bde33f57
-
SHA256
dba1526ad6018781439201b3702177468b9eff473b37db0ff3dad474ae144633
-
SHA512
eaccebd2a037b39f41ae12e045e0d94c4fc6e7c7341d257c6c967b848cebd8264273b2289ef1a38b721b50fa97df9e21b69ef26b9b1c4fb3401de1ac9dfec3b7
-
SSDEEP
384:4LJswZCefUrUNLxoNBIYULjYpj4N7SedjekWX9ISYgKuKbUYLhmb8RA0V5J:oJswZBL4Ij8jMjCnYgKzIYQ2/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 14571f2a78bfb401fe9aa07f02be2ca3
Files
-
14571f2a78bfb401fe9aa07f02be2ca3.exe windows:4 windows x86 arch:x86
a01672a32062796406f45e196fbbac0a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcp60
??0_Lockit@std@@QAE@XZ
??1_Lockit@std@@QAE@XZ
msvcrt
_controlfp
atoi
__CxxFrameHandler
realloc
memmove
free
??2@YAPAXI@Z
memcpy
wcslen
_ismbcdigit
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
_XcptFilter
_exit
_except_handler3
_mbsstr
time
localtime
strftime
exit
_purecall
memset
strcpy
wininet
HttpEndRequestA
InternetWriteFile
HttpSendRequestExA
InternetOpenA
InternetConnectA
InternetCloseHandle
HttpOpenRequestA
InternetGetConnectedState
ws2_32
WSAStartup
WSACleanup
kernel32
CreateMutexA
ReleaseMutex
DebugBreak
GetStartupInfoA
GetModuleHandleA
CreateProcessA
GetTickCount
InterlockedIncrement
lstrcpynW
lstrcpynA
SetCurrentDirectoryA
DeleteFileA
SetFilePointer
CloseHandle
WriteFile
CreateFileA
OutputDebugStringA
LeaveCriticalSection
lstrlenA
InterlockedDecrement
GetCurrentProcess
FlushInstructionCache
DeleteCriticalSection
HeapDestroy
InitializeCriticalSection
EnterCriticalSection
GetCurrentThreadId
user32
PostQuitMessage
FindWindowA
IsWindow
MsgWaitForMultipleObjects
LoadAcceleratorsA
LoadMenuA
LoadStringA
CreateWindowExA
DispatchMessageA
TranslateMessage
GetMessageA
PeekMessageA
DestroyWindow
SetWindowLongA
RegisterClassExA
LoadImageA
wsprintfA
LoadCursorA
GetClassInfoExA
wvsprintfA
CharNextA
TranslateAcceleratorA
SetTimer
KillTimer
DefWindowProcA
GetWindowLongA
SetFocus
IsWindowVisible
SendMessageA
LoadStringW
SetWindowPos
GetClientRect
GetWindowRect
CallWindowProcA
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
ole32
CoInitialize
CoUninitialize
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ