Static task
static1
Behavioral task
behavioral1
Sample
66b00cefe52e5c8d6b0c17f7a2adb0eea66c55ac5be91123b8bf0ec3d9f2b319.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
66b00cefe52e5c8d6b0c17f7a2adb0eea66c55ac5be91123b8bf0ec3d9f2b319.exe
Resource
win10v2004-20240412-en
General
-
Target
66b00cefe52e5c8d6b0c17f7a2adb0eea66c55ac5be91123b8bf0ec3d9f2b319
-
Size
356KB
-
MD5
1884d496cbb4192c2b6f89182d542d5c
-
SHA1
98121f7495943fc501cb055a2faa8e692938e3d9
-
SHA256
66b00cefe52e5c8d6b0c17f7a2adb0eea66c55ac5be91123b8bf0ec3d9f2b319
-
SHA512
2c6746f538869c5a3a876b53ff6069f8250beae7f61286c523b637e4ff6f7518f1c83edaa2e536cffa373d923115ca509131798bb2c0e0c518ee39540e714301
-
SSDEEP
6144:9j7qLove0Qb1LD/KIkno2lHIXxM9oviegYs41iCpmnyX3KJ2tkc:9j+cIkUXyahskQtc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 66b00cefe52e5c8d6b0c17f7a2adb0eea66c55ac5be91123b8bf0ec3d9f2b319
Files
-
66b00cefe52e5c8d6b0c17f7a2adb0eea66c55ac5be91123b8bf0ec3d9f2b319.exe windows:4 windows x86 arch:x86
c313e08c207f4f4f1a76e06f4082d1d9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcess
CreateFileA
SetErrorMode
Sleep
HeapFree
GetSystemTimeAsFileTime
RtlUnwind
RaiseException
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
HeapReAlloc
VirtualAlloc
GetCommandLineA
GetProcessHeap
GetStartupInfoA
ExitProcess
HeapSize
LCMapStringA
LCMapStringW
GetACP
IsValidCodePage
HeapDestroy
HeapCreate
VirtualFree
GetStdHandle
SetHandleCount
GetFileType
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetConsoleCP
GetConsoleMode
SetStdHandle
GetLocaleInfoW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEndOfFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetThreadLocale
GetOEMCP
GetCPInfo
GlobalFlags
InterlockedIncrement
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
FindResourceExA
GetCurrentProcessId
GetCurrentThread
ConvertDefaultLocale
GetModuleFileNameA
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
InterlockedDecrement
GetModuleFileNameW
FreeResource
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpW
GetVersionExA
MulDiv
GlobalAlloc
GlobalLock
GlobalUnlock
VirtualProtect
SetLastError
GetModuleHandleA
FindResourceA
LoadResource
LockResource
SizeofResource
LoadLibraryA
GetProcAddress
FreeLibrary
GetPrivateProfileStringA
MoveFileExA
DeleteFileA
WritePrivateProfileStringA
lstrlenA
CompareStringA
GetVersion
WideCharToMultiByte
MultiByteToWideChar
InterlockedExchange
CloseHandle
GetSystemTime
GlobalFree
GetFullPathNameA
GetLastError
FormatMessageA
LocalFree
user32
UnregisterClassA
GetWindowThreadProcessId
SetCursor
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
PostQuitMessage
MoveWindow
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
GetDlgItemTextA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetDesktopWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
SetForegroundWindow
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
ScreenToClient
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SystemParametersInfoA
IsIconic
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
SetPropA
GetCapture
GetActiveWindow
SetActiveWindow
MapDialogRect
GetPropA
RemovePropA
GetAsyncKeyState
GetFocus
SetFocus
GetDlgItem
IsWindowEnabled
GetKeyState
IsWindowVisible
ShowWindow
DestroyIcon
OffsetRect
GetWindow
GetSysColor
GetIconInfo
DestroyMenu
EndPaint
BeginPaint
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
DispatchMessageA
TabbedTextOutA
GetSysColorBrush
LoadCursorA
ReleaseDC
GetDC
InvalidateRect
GetClientRect
GetSystemMetrics
GetWindowLongA
SetWindowLongA
LoadIconA
GetWindowRect
GetSystemMenu
SetMenu
LoadMenuA
InsertMenuA
EnableWindow
PostMessageA
GetParent
SendMessageA
IsWindow
GetWindowPlacement
SetWindowPos
MessageBoxA
UpdateWindow
gdi32
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
SetViewportOrgEx
CreateFontIndirectA
DPtoLP
EnumFontFamiliesExA
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
DeleteObject
GetPixel
GetObjectA
CreatePen
GetTextExtentPoint32A
MoveToEx
LineTo
SetMapMode
SetBkMode
RestoreDC
SaveDC
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
GetDeviceCaps
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyA
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shlwapi
PathFindFileNameA
PathFindExtensionA
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 252KB - Virtual size: 248KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 68KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ