Static task
static1
Behavioral task
behavioral1
Sample
65a1b40586637d134ca1af1ba984bba2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
65a1b40586637d134ca1af1ba984bba2.exe
Resource
win10v2004-20231215-en
General
-
Target
65a1b40586637d134ca1af1ba984bba2
-
Size
40KB
-
MD5
65a1b40586637d134ca1af1ba984bba2
-
SHA1
2862e5eb45a9eabd3364d3183b4a0d71084d191e
-
SHA256
a4e09d4976110c14974d83a99e59ce2f3033bcc1c493860ecfa8680cca9fe1c1
-
SHA512
affd10727d069a64569d7003bc080c0aa625a84f64ef39466d4d043a88e3eb404b7c8c796020a993795d05e1027de90c59aacf2b5035d1e9c6af7b81c6cc34fa
-
SSDEEP
768:xfuGpoOe1RjVMPtu2SBrQWVr5dXUq+I17lugMqCM13Gdnz6:dTbeTmg27w9dEWCgfCM4Nz6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 65a1b40586637d134ca1af1ba984bba2
Files
-
65a1b40586637d134ca1af1ba984bba2.exe windows:4 windows x86 arch:x86
15cac00be00a3079dce8940e5cdeec23
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CreateFileA
DeleteCriticalSection
DeleteFileA
EnterCriticalSection
ExitProcess
FindClose
FindFirstFileA
GetCurrentThreadId
GetFileSize
GetFileType
GetProcAddress
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
LocalAlloc
LocalFree
lstrcpyn
lstrlen
MultiByteToWideChar
OpenMutexA
OpenProcess
ReadFile
ResumeThread
SetEndOfFile
SetFilePointer
Sleep
TerminateThread
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualProtect
WaitForSingleObject
WideCharToMultiByte
WinExec
WriteFile
user32
BeginPaint
CheckMenuRadioItem
GetWindowDC
MessageBoxA
PeekMessageA
PostMessageA
PostQuitMessage
RegisterClassA
ReleaseCapture
ReleaseDC
SendMessageA
SetCursor
SetForegroundWindow
SetMenu
SetMenuItemInfoA
SetPropA
SetScrollPos
SetScrollRange
SetSysColors
SetTimer
SetWindowLongA
SetWindowPos
ShowWindow
SystemParametersInfoA
TranslateMessage
UpdateWindow
ValidateRect
WaitMessage
wvsprintfA
gdi32
CombineRgn
CreateRectRgn
CreateSolidBrush
DeleteDC
DeleteObject
GetDeviceCaps
GetPixel
GetStockObject
MoveToEx
Rectangle
RestoreDC
SaveDC
SelectObject
SetBkColor
SetBkMode
SetBrushOrgEx
SetPixel
SetStretchBltMode
SetTextColor
SetWindowOrgEx
StretchBlt
TextOutA
shell32
DllRegisterServer
DragAcceptFiles
DragFinish
DragQueryFile
DragQueryPoint
Shell_NotifyIcon
comdlg32
ChooseColorA
ChooseFontA
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
BSS Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
DATA Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.code Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.code Size: 14KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE