?PatchCallBack@@YGPAXIPAX@Z
Static task
static1
Behavioral task
behavioral1
Sample
65f6d2b9b1a4351f29bc4e26923718cc.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
65f6d2b9b1a4351f29bc4e26923718cc.exe
Resource
win10v2004-20231215-en
General
-
Target
65f6d2b9b1a4351f29bc4e26923718cc
-
Size
926KB
-
MD5
65f6d2b9b1a4351f29bc4e26923718cc
-
SHA1
44bd67b962546a6566c3b4dedd640e7ca4409543
-
SHA256
e23b887d5b65a310187a1233ca611c18fbb3196772bd8f2b4bec22ad60b12e32
-
SHA512
b9edbe50cb65448db3a2edc6115d58633448472df4354388eaa2b4604c4b6c1ddc716b078610cbd1db5931012496f02fe57635a0aa6fe443f0310f8b1aa2a39e
-
SSDEEP
1536:779qKq4gthG03pod0Y2SIUPiLXl/zo49NAjLa0DrPa7:39qKJinpod0Y2SAZcYNT0DrPa7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 65f6d2b9b1a4351f29bc4e26923718cc
Files
-
65f6d2b9b1a4351f29bc4e26923718cc.exe windows:4 windows x86 arch:x86
3dc3371b12a2991bc86b67730a03f991
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateProcessA
WaitForSingleObject
CreateFileMappingA
CreateMutexA
FormatMessageA
GetExitCodeProcess
UnmapViewOfFile
GetVolumeInformationA
MapViewOfFileEx
GetModuleFileNameA
GetProcAddress
GetCurrentProcess
LoadLibraryA
GlobalLock
FreeLibrary
GlobalAlloc
WaitForMultipleObjects
CreateEventA
FindNextFileA
RtlUnwind
CreateFileA
CompareStringW
CompareStringA
SetStdHandle
GetStringTypeW
GetStringTypeA
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
FlushFileBuffers
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetOEMCP
GetACP
GetCPInfo
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapAlloc
LCMapStringA
MultiByteToWideChar
LCMapStringW
FindFirstFileA
GlobalUnlock
ExitProcess
FindClose
SetFilePointer
SetEndOfFile
GetFileSize
ReadFile
DeleteFileA
GetLastError
WideCharToMultiByte
WriteFile
SetEnvironmentVariableA
SetCurrentDirectoryA
CloseHandle
HeapDestroy
GetTimeZoneInformation
GetSystemTime
HeapReAlloc
TerminateProcess
GetCurrentDirectoryA
GetFullPathNameA
GetDriveTypeA
GetLocalTime
GetVersion
HeapSize
GetStartupInfoA
HeapFree
GetModuleHandleA
GetCommandLineA
user32
CreateDialogParamA
SetForegroundWindow
ShowWindow
SendMessageA
PostQuitMessage
DestroyWindow
GetDlgItem
UpdateWindow
InvalidateRect
PostThreadMessageA
SetWindowTextA
ExitWindowsEx
GetMessageA
LoadStringA
PeekMessageA
TranslateMessage
DispatchMessageA
DialogBoxParamA
SendDlgItemMessageA
EndDialog
BeginPaint
MessageBoxA
EndPaint
GetDC
ReleaseDC
GetClientRect
gdi32
SelectPalette
SelectObject
CreateCompatibleDC
CreateDIBitmap
RealizePalette
DeleteObject
DeleteDC
StretchBlt
CreatePalette
GetObjectA
SetStretchBltMode
advapi32
OpenProcessToken
LookupPrivilegeValueA
RegCloseKey
RegQueryValueExA
RegSetValueExA
AdjustTokenPrivileges
RegCreateKeyExA
RegOpenKeyExA
shell32
ShellExecuteA
comctl32
ord17
Exports
Exports
Sections
.text Size: 60KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ