Static task
static1
Behavioral task
behavioral1
Sample
65592b968398b311ddc559074eea43f0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
65592b968398b311ddc559074eea43f0N.exe
Resource
win10v2004-20240709-en
General
-
Target
65592b968398b311ddc559074eea43f0N.exe
-
Size
985KB
-
MD5
65592b968398b311ddc559074eea43f0
-
SHA1
0c8aa1c59476a639f66391107464f5fc01e92360
-
SHA256
584b88719fea65538a6aba6bbdbfd08d7adff72f83e1b45cf69b71ab5b365893
-
SHA512
bd79e778794dc3778fdfde5143b41b29e7c908a166500822d3d3e3505f03e1d8cdbd46b62dd826fd94da8db8972b7e255a5e41fb7e8e10ffddc27e74232da7c4
-
SSDEEP
24576:e5PqmAyyLhM8mXxXMNjw1yqVUnheZq04oUrDm6a:UPqVyyLqxx8Njw19WnYZzerDA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 65592b968398b311ddc559074eea43f0N.exe
Files
-
65592b968398b311ddc559074eea43f0N.exe.exe windows:6 windows x86 arch:x86
e9c418f6daae9f0030644f84648949a6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
OffsetRect
advapi32
DeleteAce
kernel32
SetStdHandle
HeapSize
CreateFileW
WaitForSingleObject
CreateThread
VirtualAlloc
GetModuleHandleA
GetProcAddress
RaiseException
InitOnceBeginInitialize
InitOnceComplete
CloseHandle
GetCurrentThreadId
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
TryAcquireSRWLockExclusive
WakeAllConditionVariable
SleepConditionVariableSRW
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
GetLastError
FreeLibraryWhenCallbackReturns
CreateThreadpoolWork
SubmitThreadpoolWork
CloseThreadpoolWork
GetModuleHandleExW
IsProcessorFeaturePresent
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
QueryPerformanceCounter
EncodePointer
DecodePointer
LCMapStringEx
GetSystemTimeAsFileTime
GetModuleHandleW
GetCPInfo
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetCurrentProcess
TerminateProcess
GetCurrentProcessId
InitializeSListHead
GetProcessHeap
RtlUnwind
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleFileNameW
GetStdHandle
WriteFile
GetCommandLineA
GetCommandLineW
HeapAlloc
HeapFree
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileType
GetFileSizeEx
SetFilePointerEx
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
ReadFile
ReadConsoleW
HeapReAlloc
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
WriteConsoleW
Sections
.text Size: 163KB - Virtual size: 162KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 49KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 762KB - Virtual size: 766KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ