Static task
static1
Behavioral task
behavioral1
Sample
d70820c9e73614ff50b1343a99819300.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
d70820c9e73614ff50b1343a99819300.exe
Resource
win10v2004-20240226-en
General
-
Target
d70820c9e73614ff50b1343a99819300
-
Size
160KB
-
MD5
d70820c9e73614ff50b1343a99819300
-
SHA1
c4778457e496b9299302fe89e3b9ce4269f632d4
-
SHA256
dcb55b49c73f06fa86f2490b4f5bd3599b9e771c7795cca148c66b69fd0edaef
-
SHA512
05061d34e28128de6cb355d38fc4ab118fbfa4123e735109c63a0b387d878e6c2042201d8b1aa2c2d64f6980680d459953834bd6baa7b77dc6b9a276bc40fe3a
-
SSDEEP
3072:7HTW8toAtzUSKMljn4unQbWRApA2BOkeOktHr3bFzyV3FjfeHwuF:LS8+MUSKIn4unCWRR2odBLw5FjeQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d70820c9e73614ff50b1343a99819300
Files
-
d70820c9e73614ff50b1343a99819300.exe windows:4 windows x86 arch:x86
027e7e3005feea60622e8f50db4cf087
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
imagehlp
ImageNtHeader
kernel32
OpenProcess
CloseHandle
VirtualAlloc
VirtualFree
SetThreadContext
SuspendThread
GetThreadContext
Sleep
ResumeThread
VirtualProtectEx
WriteProcessMemory
lstrlenA
GetCurrentProcessId
IsBadReadPtr
lstrcpyA
GetCurrentProcess
LeaveCriticalSection
EnterCriticalSection
GetExitCodeThread
WaitForSingleObject
CreateRemoteThread
GlobalFree
GlobalAlloc
GetTickCount
SetThreadPriority
GetCurrentThread
VirtualQueryEx
lstrcatA
GetEnvironmentVariableA
GetShortPathNameA
GetModuleFileNameA
GetVersionExA
CopyFileA
GetSystemDirectoryA
TerminateProcess
CreateProcessA
DeleteFileA
FindClose
FindFirstFileA
WinExec
ReadFile
SetFilePointer
CreateFileA
FlushFileBuffers
FreeResource
LockResource
LoadResource
SizeofResource
GetLastError
FindResourceA
LoadLibraryA
GetOEMCP
GetACP
ReadProcessMemory
GetVersion
DeleteCriticalSection
InitializeCriticalSection
GetModuleHandleA
GetProcAddress
SetStdHandle
SetPriorityClass
WriteFile
GetCPInfo
GetStringTypeW
GetStringTypeA
HeapFree
HeapAlloc
RtlUnwind
GetStartupInfoA
GetCommandLineA
ExitProcess
HeapDestroy
HeapCreate
HeapReAlloc
IsBadWritePtr
WideCharToMultiByte
MultiByteToWideChar
LCMapStringA
LCMapStringW
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
user32
PostThreadMessageA
advapi32
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegCreateKeyExA
shell32
ShellExecuteExA
SHChangeNotify
Sections
.text Size: 58KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 101KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ