Static task
static1
Behavioral task
behavioral1
Sample
666ea2df44aee00fa0c7dc7d830eda46.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
666ea2df44aee00fa0c7dc7d830eda46.exe
Resource
win10v2004-20231215-en
General
-
Target
666ea2df44aee00fa0c7dc7d830eda46
-
Size
67KB
-
MD5
666ea2df44aee00fa0c7dc7d830eda46
-
SHA1
d964c51a5695b8aad2ed8459c96cb97912c72a69
-
SHA256
500f1db6c1e58d03db0045fa91898d99ce791e7c186099913631490d21068b6c
-
SHA512
80b878148762105f33f6e17c330078929b07efe19769e091971e8b03b91e379af19ab57c0c75f0ffe5ca6f17809f984c76db6852463219cf16e35d9d60040eb0
-
SSDEEP
1536:ZxrENa0FEm658IAJI2OByGxBOFTYZJ5JB2mBa:LENRFEd8niByGxBJDhBa
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 666ea2df44aee00fa0c7dc7d830eda46
Files
-
666ea2df44aee00fa0c7dc7d830eda46.exe windows:4 windows x86 arch:x86
d46f2844a587777024771a9fd515b9ec
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetForegroundWindow
MsgWaitForMultipleObjects
GetKeyboardState
ExitWindowsEx
EndDialog
PeekMessageA
SendMessageA
GetCursorPos
GetDlgItemTextA
ToUnicode
GetClassNameA
GetIconInfo
GetClipboardData
GetDlgItem
DispatchMessageA
DrawIcon
SetProcessWindowStation
GetWindowThreadProcessId
CharLowerBuffA
kernel32
VirtualAlloc
GetModuleHandleA
GetCommandLineA
GetFileAttributesA
VirtualProtect
GetFileSizeEx
MulDiv
GetFileTime
GetVersionExW
lstrcmpiW
GetModuleFileNameA
LeaveCriticalSection
GlobalLock
GetTickCount
WaitForSingleObject
CreateMutexW
CreateProcessW
shlwapi
PathFindFileNameW
StrCmpNIA
wvnsprintfW
PathMatchSpecW
StrCmpNIW
wnsprintfW
PathRemoveFileSpecW
wvnsprintfA
PathFileExistsW
SHDeleteKeyA
advapi32
RegCloseKey
CryptReleaseContext
GetUserNameW
CryptCreateHash
CryptHashData
RegEnumKeyExA
RegCreateKeyExA
CryptDestroyHash
CryptGetHashParam
DuplicateTokenEx
Sections
.text Size: 66KB - Virtual size: 65KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE