Static task
static1
Behavioral task
behavioral1
Sample
66682eeb3122e60d2d9e97f90c25db29565f92e984969025b33f98431b7950aa.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral2
Sample
66682eeb3122e60d2d9e97f90c25db29565f92e984969025b33f98431b7950aa.exe
Resource
win11-20240611-en
General
-
Target
66682eeb3122e60d2d9e97f90c25db29565f92e984969025b33f98431b7950aa
-
Size
510KB
-
MD5
dde864024ed7c6647d92e398cd8e6c6b
-
SHA1
44dc845789d7a9e625bd69767965790041694cd6
-
SHA256
66682eeb3122e60d2d9e97f90c25db29565f92e984969025b33f98431b7950aa
-
SHA512
359d4cde9c775e496f04d506baa7325f3d866e859bf4818aecb5bd8514478fca64289c466b7dbd362c4c0570b0d0b8e5ce58a2120bf15cf4c1741331e1087b8b
-
SSDEEP
12288:96dKUrhKQj/xDYPFOqQPDYJHdGsNdlz0TPR3UhfnU:OvjjdYEqQLYfGg0TPJUdU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 66682eeb3122e60d2d9e97f90c25db29565f92e984969025b33f98431b7950aa
Files
-
66682eeb3122e60d2d9e97f90c25db29565f92e984969025b33f98431b7950aa.exe windows:5 windows x86 arch:x86
36e010ed97e228773a11cf6ab4a0f83f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindResourceA
IsBadStringPtrW
GetConsoleAliasesLengthW
CommConfigDialogA
SetEndOfFile
FindResourceW
LoadLibraryExW
InterlockedIncrement
CreateDirectoryW
GlobalLock
GetWindowsDirectoryA
GlobalFindAtomA
LoadLibraryW
AssignProcessToJobObject
ReplaceFileA
SetLastError
GetProcAddress
RemoveVectoredExceptionHandler
LocalAlloc
GetDiskFreeSpaceA
GlobalGetAtomNameW
OpenJobObjectW
EnumResourceTypesW
GetOEMCP
OpenFileMappingA
SetFileAttributesW
CreateFileW
SetStdHandle
WriteConsoleW
CloseHandle
SetFilePointer
GetDateFormatW
LoadLibraryA
GetSystemDefaultLangID
MultiByteToWideChar
DecodePointer
EncodePointer
GetLastError
HeapReAlloc
GetModuleHandleW
ExitProcess
GetCommandLineA
HeapSetInformation
GetStartupInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
GetCPInfo
InterlockedDecrement
GetACP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
HeapCreate
HeapFree
HeapAlloc
WriteFile
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
LCMapStringW
GetStringTypeW
RtlUnwind
HeapSize
IsProcessorFeaturePresent
GetConsoleCP
GetConsoleMode
FlushFileBuffers
user32
OpenIcon
CharUpperBuffW
GetClassInfoW
GetKeyboardLayoutNameW
DdeCmpStringHandles
GetCaretPos
SetMessageExtraInfo
advapi32
AreAllAccessesGranted
ClearEventLogW
Sections
.text Size: 417KB - Virtual size: 417KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 44KB - Virtual size: 39.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ