Static task
static1
Behavioral task
behavioral1
Sample
66bc9a9e19526fac6885cbc57dfab3d0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
66bc9a9e19526fac6885cbc57dfab3d0.exe
Resource
win10v2004-20231215-en
General
-
Target
66bc9a9e19526fac6885cbc57dfab3d0
-
Size
576KB
-
MD5
66bc9a9e19526fac6885cbc57dfab3d0
-
SHA1
5b42bc59898f8e208e7aa9d22e87fd9224377392
-
SHA256
345ace482bcac70f4dbe40b9499d4c9525a555a520d1835ab97bedaa3d697a17
-
SHA512
0f79666192afe0d04f926d51ccb9a58cec1bde995d4a51914e628ae3d06a510e8723be6e8d35dc87a41ab0798a5917e5fc77c763017bb4e6704080b846784611
-
SSDEEP
12288:JwNb+GYHGEcAWvh8Fcc+r/Zl3Rwtrbzak:Jwp+GYHGEuvh8ac+1lav+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 66bc9a9e19526fac6885cbc57dfab3d0
Files
-
66bc9a9e19526fac6885cbc57dfab3d0.exe windows:4 windows x86 arch:x86
96335b779dbd67f45d016a392954d93a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DdeQueryStringA
IsWindowEnabled
DrawTextExA
BeginDeferWindowPos
GetWindowThreadProcessId
LoadStringW
GetMenuCheckMarkDimensions
IsZoomed
CharPrevA
GetSysColor
ImpersonateDdeClientWindow
GetClassInfoA
PostThreadMessageW
RegisterClassA
CharToOemW
OpenClipboard
SwitchToThisWindow
GetClipboardFormatNameA
GetClipboardSequenceNumber
TrackPopupMenuEx
ShowWindow
EndPaint
GetCapture
GetWindowModuleFileNameW
GetWindowTextW
InsertMenuW
CreateWindowExA
TranslateMessage
OpenWindowStationA
GetThreadDesktop
GetDlgItemTextW
CreateWindowExW
GetUpdateRect
GetOpenClipboardWindow
RegisterHotKey
SetClipboardData
CascadeChildWindows
LoadImageA
DefWindowProcA
SetForegroundWindow
PaintDesktop
SetDlgItemTextA
LoadCursorW
UnhookWindowsHookEx
EnumClipboardFormats
RegisterClassExA
IsClipboardFormatAvailable
CreateAcceleratorTableW
LockWindowUpdate
DragDetect
DrawStateA
GetGuiResources
MessageBoxW
wvsprintfW
SetWindowLongA
DestroyWindow
GetMenuItemCount
SetWindowPlacement
GetCursorPos
DefFrameProcW
GetPropA
GetScrollRange
LoadMenuA
TileWindows
CopyAcceleratorTableA
CallMsgFilter
DlgDirListA
SetWindowContextHelpId
DdeAbandonTransaction
ChangeDisplaySettingsA
CreateCaret
SetSystemCursor
DdeDisconnect
kernel32
WriteConsoleInputA
GetTimeZoneInformation
GetStartupInfoA
GetNumberFormatA
WriteConsoleOutputCharacterA
HeapAlloc
GetUserDefaultLangID
GetLocaleInfoW
GetStringTypeW
FindNextFileA
HeapDestroy
GetCurrentProcess
FlushInstructionCache
ReleaseMutex
VirtualFree
IsValidLocale
MultiByteToWideChar
GetStdHandle
CompareStringA
TlsAlloc
WriteConsoleOutputW
OpenMutexA
EnumCalendarInfoExW
WriteFile
InitializeCriticalSection
GetEnvironmentStrings
LCMapStringW
VirtualProtect
CreateMutexA
EnumSystemLocalesA
GetACP
QueryPerformanceCounter
GetCurrentThreadId
GetLocaleInfoA
GetCommandLineA
CloseHandle
GetModuleFileNameA
GetEnvironmentStringsW
GetLastError
GetProcAddress
GetVersionExA
WaitCommEvent
SetFileAttributesW
SetHandleCount
GetModuleHandleA
HeapSize
SetFilePointer
GetTimeFormatA
HeapFree
UnhandledExceptionFilter
HeapCreate
ReadFile
VirtualQuery
ExitProcess
LCMapStringA
TlsGetValue
FreeEnvironmentStringsA
InterlockedCompareExchange
SetStdHandle
GetCurrentThread
GetCPInfo
IsBadWritePtr
WaitNamedPipeW
GetPrivateProfileSectionNamesA
RtlUnwind
EnterCriticalSection
VirtualLock
OpenWaitableTimerA
DeleteCriticalSection
lstrlen
SetFileTime
GetUserDefaultLCID
TlsSetValue
GetStringTypeA
CompareStringW
GetShortPathNameA
GetAtomNameW
FreeEnvironmentStringsW
LoadLibraryA
GetTickCount
IsValidCodePage
InterlockedExchange
SetLastError
VirtualAlloc
GetOEMCP
GetSystemTimeAsFileTime
TlsFree
HeapReAlloc
SetEnvironmentVariableA
LeaveCriticalSection
GetDateFormatA
lstrlenW
GetSystemInfo
FlushFileBuffers
GetThreadLocale
TerminateProcess
GetFileType
GetCurrentProcessId
WideCharToMultiByte
LocalFree
comctl32
InitCommonControlsEx
CreateStatusWindow
ImageList_SetDragCursorImage
ImageList_Add
ImageList_DragMove
ImageList_AddIcon
DrawStatusTextA
ImageList_GetFlags
GetEffectiveClientRect
ImageList_DragLeave
Sections
.text Size: 180KB - Virtual size: 176KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 252KB - Virtual size: 250KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 116KB - Virtual size: 137KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ