Static task
static1
Behavioral task
behavioral1
Sample
67a7319e464405c2aa78828f24385d4b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
67a7319e464405c2aa78828f24385d4b.exe
Resource
win10v2004-20231215-en
General
-
Target
67a7319e464405c2aa78828f24385d4b
-
Size
46KB
-
MD5
67a7319e464405c2aa78828f24385d4b
-
SHA1
aed7e2d5e999e8e9bd1b4d1aa6abe9459ae41a28
-
SHA256
996c932c04f41376d565c47896fab97669f3e5907bca58e23e777c7a0bfe5d27
-
SHA512
f63625c3b7c693f517fc34783fc89631d82a148a2f584a94f3ef40f0f7beb1e2975d09c85344d2c089b9fe333c1118a70b7be51907d5fbcc05b84010015e3e31
-
SSDEEP
768:cGx30j5zlcjJ8l/3++8j7DD6wy631cEyrcPWDy9uG7zefYxEjTlxFfWOMaz5TW:pxENg8VuB7//SXcP0yRz7EjTlxFfc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 67a7319e464405c2aa78828f24385d4b
Files
-
67a7319e464405c2aa78828f24385d4b.exe windows:5 windows x86 arch:x86
17bca89719dd8c7fe274145cfe1a03b1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetClassNameW
GetKeyboardState
SetProcessWindowStation
GetKeyState
GetMessageA
PeekMessageW
GetMessageW
OpenDesktopA
GetIconInfo
GetWindowLongW
EndDialog
DrawIcon
LoadCursorW
SendMessageW
DispatchMessageW
GetDlgItem
GetDlgItemTextA
OpenWindowStationA
PeekMessageA
CloseWindowStation
GetForegroundWindow
FindWindowExW
GetWindowThreadProcessId
CloseDesktop
CharLowerBuffA
GetClipboardData
ExitWindowsEx
GetDlgItemTextW
GetWindowTextW
ToUnicode
MsgWaitForMultipleObjects
GetCursorPos
SetThreadDesktop
kernel32
FlushFileBuffers
InitializeCriticalSection
WaitForSingleObject
SetLastError
GetModuleFileNameW
SetEvent
ResetEvent
SetFileTime
SetFilePointer
Sleep
SetFileAttributesW
HeapReAlloc
WriteProcessMemory
lstrcmpiA
GlobalLock
GetModuleHandleA
SetThreadPriority
CloseHandle
lstrlenW
MoveFileExW
GetLastError
OpenMutexW
GetCurrentThreadId
lstrcpyW
IsBadReadPtr
CreateMutexW
CreateThread
ExpandEnvironmentStringsW
lstrcmpiW
FindClose
WriteFile
lstrcatW
GetFileSize
GetComputerNameW
GetSystemTimeAsFileTime
ReadFile
DeleteFileW
GetProcessHeap
CreateProcessW
lstrcpynW
GetCurrentProcessId
LeaveCriticalSection
GetTimeZoneInformation
lstrcatA
GetDriveTypeW
OpenProcess
HeapFree
GetFileSizeEx
GetVersionExW
CreateFileW
GetExitCodeProcess
HeapAlloc
SetEndOfFile
GetProcessTimes
WideCharToMultiByte
ReleaseMutex
MultiByteToWideChar
UnmapViewOfFile
Sections
.ngp Size: 36KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.wpix Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.epozkz Size: 7KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ