Static task
static1
Behavioral task
behavioral1
Sample
b70d7d5ae8ed3da1d0b5c78bf9e8ee9cbddcb84f023caf363798640326920eb4N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b70d7d5ae8ed3da1d0b5c78bf9e8ee9cbddcb84f023caf363798640326920eb4N.exe
Resource
win10v2004-20241007-en
General
-
Target
b70d7d5ae8ed3da1d0b5c78bf9e8ee9cbddcb84f023caf363798640326920eb4N
-
Size
351KB
-
MD5
2a83f14fa728ca5daede22e023feaa90
-
SHA1
22e3bf72fb3ad268ab0a87c2166fad746099589e
-
SHA256
b70d7d5ae8ed3da1d0b5c78bf9e8ee9cbddcb84f023caf363798640326920eb4
-
SHA512
544f5bcd26ebc68cae8656d86fa02129e5012a58d22e636fdcaab8f87a319eafa65196fe8d41cef26bae149663af7d43d8e4419caa42c986af38b78960aaacc7
-
SSDEEP
6144:bhsAGJ+HbpcscFDZ6UWHfS+2wOW8Rh6SuDjGUpH2Z/C:bhNk+HbUZgFkLR8xCYWo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b70d7d5ae8ed3da1d0b5c78bf9e8ee9cbddcb84f023caf363798640326920eb4N
Files
-
b70d7d5ae8ed3da1d0b5c78bf9e8ee9cbddcb84f023caf363798640326920eb4N.exe windows:5 windows x86 arch:x86
c9048337737b7dc726fdaee901e7e03f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
GetLastError
WriteFile
ReadFile
SetFilePointer
CloseHandle
CreateFileW
TerminateThread
lstrcpynA
HeapAlloc
HeapFree
GetProcessHeap
TerminateProcess
DeviceIoControl
FindClose
GetLocalTime
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleW
ExpandEnvironmentStringsW
SetCurrentDirectoryW
CreateDirectoryW
SetFileAttributesW
FindFirstFileW
FindNextFileW
CopyFileExW
WideCharToMultiByte
CreateToolhelp32Snapshot
Process32FirstW
SetEndOfFile
ReadConsoleW
WriteConsoleW
SetStdHandle
LoadLibraryW
LoadLibraryExW
OutputDebugStringW
MultiByteToWideChar
CopyFileW
DeleteFileW
GetTempPathW
WinExec
WaitForSingleObject
InitializeCriticalSectionAndSpinCount
ResumeThread
SetThreadPriority
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
SetFilePointerEx
GetFileType
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetOEMCP
GetACP
IsValidCodePage
GetCurrentThreadId
HeapSize
AreFileApisANSI
GetModuleHandleExW
ExitProcess
GetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
GetProcAddress
GetStartupInfoW
TlsFree
Process32NextW
CreateThread
InterlockedIncrement
InterlockedDecrement
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
GetStringTypeW
RaiseException
RtlUnwind
HeapReAlloc
IsDebuggerPresent
IsProcessorFeaturePresent
GetCommandLineA
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
GetCurrentProcess
TlsAlloc
TlsGetValue
TlsSetValue
user32
LoadStringW
wvsprintfW
FindWindowExW
FindWindowW
PostMessageW
PostThreadMessageW
wsprintfW
shell32
SHGetSpecialFolderPathW
SHCreateDirectoryExW
SHFileOperationW
ole32
CoCreateInstance
CoUninitialize
CoInitialize
ws2_32
recv
gethostbyname
htons
connect
closesocket
socket
send
WSAStartup
shlwapi
PathFileExistsW
wininet
InternetCloseHandle
InternetOpenW
InternetReadFile
InternetOpenUrlW
iphlpapi
GetAdaptersInfo
Sections
.text Size: 243KB - Virtual size: 242KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 49KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 47KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ