Static task
static1
Behavioral task
behavioral1
Sample
a12c14c7ac40ceb5d49ede17fd205170.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a12c14c7ac40ceb5d49ede17fd205170.exe
Resource
win10v2004-20240221-en
General
-
Target
a12c14c7ac40ceb5d49ede17fd205170
-
Size
1.3MB
-
MD5
a12c14c7ac40ceb5d49ede17fd205170
-
SHA1
51f138083805a7e3e5126c0d23640cfadb10427e
-
SHA256
4b1e557eeaecfee738861d658e650e45b4f0188efcae012d6f0917ec2ffc6f46
-
SHA512
2013fc529bd9326953988b21a9b879095c3ea8cb7303b87c636c3941e63eb4613952139056a942503453857f8b1ab65434adc3fc5b846c2675795c155815d3e2
-
SSDEEP
24576:zpTE6lG4xl4hVZJHsiKEnveaThR/8ixjYzDxogkLqj5WoxZf59085wy/4D:/lG4UJHLK4hR0WODPkI/xz908GzD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a12c14c7ac40ceb5d49ede17fd205170
Files
-
a12c14c7ac40ceb5d49ede17fd205170.exe windows:4 windows x86 arch:x86
83ec17ee22f36c8e671c55fd0f1e7de5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord1783
ord858
ord1200
ord4055
ord537
ord535
ord823
ord3610
ord656
ord924
ord6199
ord941
ord1175
ord2818
ord6334
ord940
ord3874
ord2864
ord6008
ord4000
ord3914
ord3089
ord4125
ord6889
ord3287
ord939
ord3297
ord6676
ord4673
ord4274
ord6375
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord2725
ord4079
ord4698
ord5307
ord5289
ord5714
ord4622
ord3738
ord561
ord815
ord609
ord2621
ord1134
ord1205
ord3953
ord1146
ord1168
ord641
ord793
ord765
ord2393
ord1228
ord2763
ord4129
ord4277
ord5683
ord2379
ord2302
ord470
ord5572
ord2915
ord690
ord5807
ord5204
ord3229
ord389
ord922
ord2645
ord6215
ord926
ord715
ord415
ord324
ord4234
ord2642
ord6197
ord6880
ord3092
ord2086
ord4287
ord4710
ord6453
ord1081
ord2761
ord4376
ord3619
ord3573
ord3626
ord3663
ord2414
ord3797
ord1641
ord6662
ord2575
ord4396
ord3574
ord3698
ord3719
ord2363
ord1105
ord2614
ord861
ord3811
ord4275
ord809
ord556
ord1088
ord2122
ord2860
ord5875
ord2754
ord6358
ord2859
ord6605
ord3398
ord3733
ord810
ord384
ord686
ord4271
ord2862
ord2097
ord2453
ord2370
ord825
ord567
ord540
ord860
ord795
ord800
ord3597
ord4425
ord4627
ord4080
ord3079
ord3825
ord3831
ord3830
ord2976
ord3081
ord2985
ord3262
ord3136
ord4465
ord3259
ord3147
ord2982
ord5277
ord2124
ord2446
ord5261
ord1727
ord5065
ord3749
ord6376
ord2055
ord2648
ord4441
ord4837
ord3798
ord5280
ord4353
ord6374
ord5163
ord2385
ord5241
ord4407
ord1775
ord4078
ord6052
ord2514
ord4998
ord4853
ord5265
ord3721
ord4424
ord3402
ord5290
ord1776
ord755
ord6055
ord1576
msvcrt
_mbsicmp
sprintf
_stricmp
calloc
_mbsstr
_ftol
??1type_info@@UAE@XZ
__dllonexit
_onexit
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_setmbcp
__CxxFrameHandler
_mbscmp
isdigit
_CxxThrowException
_access
__p___argc
__p___argv
free
_strnicmp
strtok
malloc
memmove
_splitpath
_controlfp
kernel32
lstrlenA
MultiByteToWideChar
WideCharToMultiByte
lstrcatA
CreateDirectoryA
SizeofResource
LockResource
LoadResource
FindResourceA
WriteFile
CreateFileA
WinExec
GetModuleFileNameA
ReadFile
SystemTimeToFileTime
GetCurrentDirectoryA
LocalFileTimeToFileTime
SetFileTime
ResumeThread
LocalFree
FormatMessageA
InterlockedExchange
GetWindowsDirectoryA
GetModuleHandleA
GetStartupInfoA
FreeLibrary
GetProcAddress
LoadLibraryA
GetVersionExA
CloseHandle
DeleteFileA
CreateProcessA
GetSystemDirectoryA
lstrcpyA
FindFirstFileA
SetFilePointer
user32
PtInRect
SetCursor
GetSysColor
IsWindow
ReleaseDC
MessageBeep
SetWindowLongA
SendMessageA
EnableWindow
RedrawWindow
SetTimer
GetParent
GetDC
CopyIcon
LoadCursorA
InflateRect
PostMessageA
ScreenToClient
KillTimer
DestroyCursor
RegisterWindowMessageA
GetWindowRect
InvalidateRect
UpdateWindow
FindWindowA
wsprintfA
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
MessageBoxA
LoadIconA
GetFocus
GetMessagePos
gdi32
GetStockObject
GetObjectA
CreateFontIndirectA
CreateFontA
CreateSolidBrush
GetTextExtentPoint32A
advapi32
RegOpenKeyExA
RegQueryValueA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
shell32
SHGetFolderPathA
SHFileOperationA
SHGetSpecialFolderPathA
SHChangeNotify
ShellExecuteA
SHBrowseForFolderA
SHGetMalloc
SHGetPathFromIDListA
SHGetSpecialFolderLocation
comctl32
ord17
ole32
CoCreateInstance
CoInitialize
CoUninitialize
CoTaskMemFree
oleaut32
SysAllocString
SysStringLen
SysFreeString
urlmon
URLDownloadToCacheFileA
msvcp60
??0_Lockit@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
?find_first_of@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?max_size@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIXZ
?_Xlen@std@@YAXXZ
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?erase@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@II@Z
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Xran@std@@YAXXZ
??1_Lockit@std@@QAE@XZ
wininet
HttpOpenRequestA
InternetCloseHandle
InternetConnectA
InternetOpenA
HttpSendRequestA
InternetReadFile
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
iphlpapi
GetAdaptersInfo
shlwapi
StrFormatByteSizeA
Sections
.text Size: 76KB - Virtual size: 73KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2.3MB - Virtual size: 2.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ