Static task
static1
Behavioral task
behavioral1
Sample
870bfee37647b450c3a7f9a05c367f21.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
870bfee37647b450c3a7f9a05c367f21.exe
Resource
win10v2004-20231222-en
General
-
Target
870bfee37647b450c3a7f9a05c367f21
-
Size
136KB
-
MD5
870bfee37647b450c3a7f9a05c367f21
-
SHA1
b99a4f2a542daeb2c99d779cd81d51f13f81a561
-
SHA256
7f57e9acaaa2f3c562402edb541eca98f4fb79c6b31531963d73a512284fc6f6
-
SHA512
3191d28bb76bb60573db8c7c54eea788bc2df4563a4b750e9de68b9f0499287eca843f86687baa4b1f4b5ef6660b98fb388319df8a5882fd27535e495304c09b
-
SSDEEP
3072:EsjRGc/eLy9CfXhYWgKHGrB7gUQxl0Fv:NofzFHGvFv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 870bfee37647b450c3a7f9a05c367f21
Files
-
870bfee37647b450c3a7f9a05c367f21.exe windows:4 windows x86 arch:x86
abebb742055db99bf594865d8d5bdf12
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ResetEvent
GetVersionExA
OpenProcess
GetCurrentProcess
VirtualFree
VirtualAlloc
GetCurrentProcessId
MultiByteToWideChar
DisconnectNamedPipe
WriteFile
ReleaseMutex
WaitForMultipleObjects
WaitNamedPipeA
SetNamedPipeHandleState
SetEvent
ReadFile
SetFilePointer
SetEndOfFile
FlushFileBuffers
WaitForSingleObject
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
SetStdHandle
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetOEMCP
GetACP
GetCPInfo
InterlockedIncrement
InterlockedDecrement
RtlUnwind
TlsGetValue
SetLastError
TlsAlloc
CreateThread
GlobalLock
GlobalUnlock
GetModuleHandleA
CreateFileA
LoadLibraryA
CreateEventA
GetProcAddress
FreeLibrary
CreateProcessA
UnmapViewOfFile
GetModuleFileNameA
OpenFileMappingA
MapViewOfFile
Sleep
CreateMutexA
GetLastError
CloseHandle
TlsSetValue
GetCurrentThreadId
ExitProcess
TerminateProcess
HeapFree
GetCommandLineA
GetVersion
HeapAlloc
GetTimeZoneInformation
GetSystemTime
GetLocalTime
HeapReAlloc
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
HeapDestroy
HeapCreate
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
user32
GetDC
GetDesktopWindow
GetWindowInfo
ReleaseDC
ExitWindowsEx
GetWindowTextA
SetWindowTextA
GetForegroundWindow
GetDlgItemTextA
LoadIconA
SendMessageA
GetClipboardData
CloseClipboard
SetDlgItemTextW
SetDlgItemTextA
SendDlgItemMessageA
SetWindowLongA
GetWindowLongA
EndDialog
MessageBoxA
DialogBoxParamA
GetAsyncKeyState
MsgWaitForMultipleObjectsEx
OpenClipboard
advapi32
AdjustTokenPrivileges
OpenProcessToken
LookupAccountNameW
FreeSid
EqualSid
AllocateAndInitializeSid
LookupPrivilegeValueA
GetTokenInformation
comctl32
ord17
gdi32
SelectObject
DeleteDC
CreateCompatibleBitmap
CreateCompatibleDC
GetDIBits
BitBlt
DeleteObject
shell32
ShellExecuteA
Sections
.text Size: 104KB - Virtual size: 101KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ