Static task
static1
Behavioral task
behavioral1
Sample
65065ba352e60911337a18fa2671689f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
65065ba352e60911337a18fa2671689f.exe
Resource
win10v2004-20231222-en
General
-
Target
65065ba352e60911337a18fa2671689f
-
Size
829KB
-
MD5
65065ba352e60911337a18fa2671689f
-
SHA1
997e1601246569dce08b05d4c2081d451e22053e
-
SHA256
37e3a96a7d4b71da4c129ad71630f954e5db2527185a84d29a48ed56b8680b75
-
SHA512
6eea9b99253f1c6910e630f30b722abf8057abb68e638e71be4828efd514ccb3f34296ad6715666c5fc0c99b324d1e18f3bd5a5e86b312ce30c083a582c9bc03
-
SSDEEP
12288:bb3SJ9Qy/Y1GchhqNVmzvBp4c7keQ51FFXeSrE5OOIdzLFwPvZxxuL:HSJ9NgrQVmj/keuzFX1gQO+OpTuL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 65065ba352e60911337a18fa2671689f
Files
-
65065ba352e60911337a18fa2671689f.exe windows:4 windows x86 arch:x86
5f6b0052a666f2c312a8bdc8c9212a88
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetWindowPos
IsWindow
DispatchMessageA
GetDC
GetCursorPos
GetClientRect
DestroyWindow
GetParent
ShowWindow
EnableWindow
TranslateMessage
LoadStringA
IsIconic
RegisterClassA
CreateWindowExA
FillRect
ReleaseDC
EndPaint
PeekMessageA
BeginPaint
KillTimer
DefWindowProcA
GetSystemMetrics
EnableMenuItem
GetWindowRect
PostMessageA
SetWindowLongA
SetWindowTextA
SetTimer
GetDlgItem
ScreenToClient
LoadCursorA
LoadIconA
GetDesktopWindow
SetForegroundWindow
EndDialog
MessageBeep
SetDlgItemTextA
MessageBoxA
CallWindowProcA
SendMessageA
InvalidateRect
GetSysColor
IsWindowVisible
SetCursor
oleaut32
SysAllocString
VariantInit
SysFreeString
SysAllocStringLen
SysStringLen
VariantClear
kernel32
GetStdHandle
GetConsoleOutputCP
ReleaseMutex
FileTimeToSystemTime
GetFileAttributesA
WaitForSingleObject
SetEndOfFile
HeapDestroy
GetFileAttributesW
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
GetCurrentDirectoryA
GetLocaleInfoA
LocalAlloc
CreateFileA
LoadLibraryExW
FreeEnvironmentStringsW
SetStdHandle
GetCPInfo
GetStringTypeA
InterlockedExchange
WriteFile
GetTimeZoneInformation
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
GetFullPathNameA
SetEvent
LocalFree
GetEnvironmentVariableA
LoadResource
GlobalLock
FindClose
InterlockedDecrement
GetCurrentThread
GetCommandLineA
GetCurrentProcessId
GetModuleHandleA
GetLastError
GetCurrentThreadId
GetVersion
GetTickCount
ExitProcess
HeapAlloc
GetProcessHeap
VirtualAlloc
Sleep
VirtualFree
FindResourceW
HeapCreate
CreateProcessA
GetEnvironmentStrings
GetModuleHandleW
GetACP
CloseHandle
ReadFile
SetFilePointer
TlsFree
MapViewOfFile
RaiseException
InterlockedCompareExchange
HeapSize
WideCharToMultiByte
GetCommandLineW
LockResource
SizeofResource
FileTimeToLocalFileTime
lstrlenW
VirtualQuery
GlobalUnlock
GetEnvironmentStringsW
GetThreadLocale
LCMapStringA
GetConsoleCP
GlobalFree
lstrlenA
UnmapViewOfFile
LCMapStringW
LeaveCriticalSection
TlsSetValue
GetFileType
CreateEventA
CreateFileW
CreateEventW
RemoveDirectoryA
WaitForMultipleObjects
FindFirstFileW
CreateFileMappingA
CompareStringA
lstrcpyA
FindFirstFileA
CompareStringW
GetProcAddress
SetErrorMode
GetWindowsDirectoryA
DeleteFileA
GetFileSize
LoadLibraryA
GetVersionExA
TlsAlloc
QueryPerformanceCounter
FreeLibrary
SetHandleCount
EnterCriticalSection
HeapFree
WriteConsoleW
SetCurrentDirectoryA
InterlockedIncrement
GetConsoleMode
GlobalAlloc
WriteConsoleA
TerminateProcess
SetEnvironmentVariableA
GetSystemDirectoryA
MulDiv
GetStartupInfoA
SetUnhandledExceptionFilter
CreateThread
GetLocalTime
MultiByteToWideChar
TlsGetValue
UnhandledExceptionFilter
LoadLibraryExA
GetModuleFileNameA
FlushFileBuffers
IsDebuggerPresent
GetModuleFileNameW
InitializeCriticalSection
SetLastError
FormatMessageA
gdi32
BitBlt
SetBkColor
GetDeviceCaps
DeleteDC
SetTextColor
CreateCompatibleDC
SelectObject
CreateSolidBrush
SetBkMode
CreateCompatibleBitmap
ole32
CoInitialize
CoCreateInstance
advapi32
RegOpenKeyExW
RegOpenKeyExA
RegCreateKeyExW
RegQueryValueExW
RegSetValueExW
Sections
.text Size: 782KB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ