Static task
static1
Behavioral task
behavioral1
Sample
66abe710c4f318547a139fdbe58249f9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
66abe710c4f318547a139fdbe58249f9.exe
Resource
win10v2004-20231215-en
General
-
Target
66abe710c4f318547a139fdbe58249f9
-
Size
160KB
-
MD5
66abe710c4f318547a139fdbe58249f9
-
SHA1
b3262c2c1c936a3ad26b6eaa8013a64c32abc6cc
-
SHA256
6d1a0515ff99899891a0c111c940dbaaae1a1ee56d94ba50142d61fe4c1880f8
-
SHA512
3b9d8ccec3950ee581ebf7cb21458a4521c3b8bb55a84e6f5615b01cc144f9a47f2947b402b5b36824dea5843bf9fe143170094ede283c13ba592d807aa85752
-
SSDEEP
1536:99pZeTgJePO1eAZoxbeGj2xZzZloi5wPYhcxt0hKRkV1qMH8x:xkg1eks1j2/T+kNpc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 66abe710c4f318547a139fdbe58249f9
Files
-
66abe710c4f318547a139fdbe58249f9.exe windows:5 windows x86 arch:x86
1e51879f116875acc43c110bde26f8d6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
user32
SetWindowTextA
GetSysColor
SetWindowPos
PostQuitMessage
GetSubMenu
UnhookWindowsHookEx
EnableMenuItem
GetMessageA
EqualRect
EnumWindows
GetSysColorBrush
FrameRect
GetScrollPos
kernel32
VirtualAllocEx
GetSystemTime
InterlockedExchange
GetFileAttributesA
RtlUnwind
GetOEMCP
ExitProcess
GetTickCount
GetCurrentProcessId
QueryPerformanceCounter
FileTimeToSystemTime
GetACP
GetStartupInfoA
GetThreadLocale
SetUnhandledExceptionFilter
GetTimeZoneInformation
GetTempPathA
gdi32
DPtoLP
CopyEnhMetaFileA
CreateICW
GetMapMode
ExcludeClipRect
CreateCompatibleBitmap
SetViewportExtEx
SelectClipPath
FillRgn
ole32
OleRun
CoCreateInstance
StringFromGUID2
CoInitializeSecurity
DoDragDrop
CoInitialize
StgOpenStorage
CoTaskMemRealloc
CoRevokeClassObject
advapi32
CryptHashData
FreeSid
QueryServiceStatus
RegCreateKeyA
GetUserNameA
RegQueryValueExW
RegCreateKeyExW
CheckTokenMembership
GetSecurityDescriptorDacl
AdjustTokenPrivileges
msvcrt
strncpy
_mbscmp
_strdup
_CIpow
fprintf
_flsbuf
signal
__getmainargs
_lock
__initenv
__setusermatherr
raise
puts
strcspn
_fdopen
fflush
strlen
iswspace
comctl32
InitCommonControls
ImageList_SetIconSize
ImageList_Destroy
ImageList_GetBkColor
CreatePropertySheetPageA
ImageList_Write
ImageList_GetIconSize
ImageList_ReplaceIcon
ImageList_DrawEx
ImageList_LoadImageA
ImageList_GetIcon
ImageList_LoadImageW
ImageList_DragEnter
shell32
CommandLineToArgvW
ShellExecuteW
DragAcceptFiles
ShellExecuteEx
SHBrowseForFolderA
ExtractIconW
ExtractIconExW
DoEnvironmentSubstW
DragQueryFileW
DragQueryFileA
SHGetPathFromIDList
oleaut32
SafeArrayPutElement
SafeArrayUnaccessData
VariantCopy
SafeArrayRedim
SafeArrayCreate
SafeArrayPtrOfIndex
SafeArrayGetUBound
SysReAllocStringLen
Sections
.text Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 86KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE