Static task
static1
Behavioral task
behavioral1
Sample
4b65c9ec4b46d7ad8cb5c47654f2a048.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4b65c9ec4b46d7ad8cb5c47654f2a048.exe
Resource
win10v2004-20231215-en
General
-
Target
4b65c9ec4b46d7ad8cb5c47654f2a048
-
Size
46KB
-
MD5
4b65c9ec4b46d7ad8cb5c47654f2a048
-
SHA1
fe9a91fe9dcde57be2040bad380f018ede234de3
-
SHA256
62b1db1f501ad67189ebd85db3814e75497cfce5c7bab7adf01f115b7a5cb556
-
SHA512
2316144054a5d23a34d1fc7e22877a6179eae61c4d9ffe7834a5e37de9928247ee62490f17c846c56a428214c7fea885c8d6c3abf84be1d3c53aaca170896a32
-
SSDEEP
768:CMe8nmoB3LHokRe+nE6QPtYX51akzMygIULGR8pgCERCwvlAr6pdss5:5dn/pJef6pXjxMhRLTZERTp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4b65c9ec4b46d7ad8cb5c47654f2a048
Files
-
4b65c9ec4b46d7ad8cb5c47654f2a048.exe windows:5 windows x86 arch:x86
2d1c1a2e9aeb184267fb7ce1900625cb
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
EndDialog
MsgWaitForMultipleObjects
OpenWindowStationA
PeekMessageA
FindWindowExW
GetIconInfo
GetForegroundWindow
ToUnicode
GetDlgItemTextA
CharLowerBuffA
GetKeyState
GetWindowLongW
GetMessageA
OpenDesktopA
GetDlgItemTextW
SetProcessWindowStation
GetClassNameW
GetWindowTextW
GetMessageW
DrawIcon
LoadCursorW
GetDlgItem
GetCursorPos
DispatchMessageW
GetKeyboardState
GetClipboardData
CloseWindowStation
ExitWindowsEx
GetWindowThreadProcessId
PeekMessageW
CloseDesktop
SetThreadDesktop
SendMessageW
kernel32
lstrlenA
GetFileTime
ResetEvent
GetCurrentProcessId
ExpandEnvironmentStringsW
CreateEventW
CopyFileW
GlobalUnlock
CreateMutexW
WriteFile
MapViewOfFile
GetCommandLineA
CreateFileW
Sleep
FindNextFileW
GetThreadPriority
GetTempFileNameW
GetSystemTime
ReleaseMutex
GetUserDefaultUILanguage
GetTempPathW
GetModuleFileNameA
lstrcpynW
lstrcatW
lstrcatA
GetTickCount
lstrlenW
GetExitCodeProcess
WideCharToMultiByte
UnmapViewOfFile
SetEvent
GetModuleFileNameW
GetProcessTimes
CreateProcessW
lstrcpyA
ReadFile
GetComputerNameW
IsBadReadPtr
WriteProcessMemory
MultiByteToWideChar
GetProcessHeap
SetFilePointer
MoveFileExW
CreateFileMappingW
GetFileSizeEx
GetTimeZoneInformation
CreateDirectoryW
InitializeCriticalSection
GetLastError
SetEndOfFile
GlobalLock
FindResourceW
OpenProcess
SetFileTime
lstrcmpiA
DeleteFileW
SetFileAttributesW
Sections
.qxypcv Size: 36KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.qzkt Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.lmhyj Size: 7KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ