Static task
static1
Behavioral task
behavioral1
Sample
63f52af1383aa81124e041df53d84fa4210685f486b56bcad86c183a47f976db.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
63f52af1383aa81124e041df53d84fa4210685f486b56bcad86c183a47f976db.exe
Resource
win10v2004-20231023-en
General
-
Target
63f52af1383aa81124e041df53d84fa4210685f486b56bcad86c183a47f976db
-
Size
48KB
-
MD5
ecf2ae1a52dfe72aee0d4fbd81c82687
-
SHA1
a3abb0aaed3f00e212c145f18a7a1cb4fce72876
-
SHA256
63f52af1383aa81124e041df53d84fa4210685f486b56bcad86c183a47f976db
-
SHA512
6d6dc6580f203343f364c40336455c3f7ec7b20a9b8ba8e8d48920f2d4b9cec2b2a72c098830dfb1297862a3510ce5a867eeb0a602b56c655a22d998da3e0064
-
SSDEEP
384:G8J2CinGNNV1zzKMa/zMoLKpQytAA7E44PV0VeBOSVo1AaVZt49WK21RrGtgMO2n:G42CG0YzMYKxB+7zG1BVZtBKgctg0I1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 63f52af1383aa81124e041df53d84fa4210685f486b56bcad86c183a47f976db
Files
-
63f52af1383aa81124e041df53d84fa4210685f486b56bcad86c183a47f976db.exe windows:4 windows x86 arch:x86
44fd6c6fa8e202378791e7bfeb9e7073
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
userenv
GetUserProfileDirectoryA
shlwapi
StrStrIA
UrlIsA
SHGetValueA
PathFileExistsA
PathRemoveFileSpecA
PathRemoveBlanksA
comdlg32
GetOpenFileNameA
shell32
ShellExecuteA
kernel32
GetModuleHandleA
GetStartupInfoA
CreateFileMappingA
MapViewOfFile
GetFileSize
UnmapViewOfFile
GetPrivateProfileIntA
GetModuleFileNameA
CloseHandle
CreateFileA
DeleteFileA
GetPrivateProfileStringA
GetCurrentProcess
CopyFileA
WritePrivateProfileStringA
CreateDirectoryA
GetUserDefaultLCID
WideCharToMultiByte
MultiByteToWideChar
user32
MessageBoxA
FindWindowA
advapi32
RegOpenKeyExA
OpenProcessToken
RegCloseKey
RegQueryValueExA
ole32
CLSIDFromProgID
CoCreateInstance
CoInitialize
oleaut32
SysAllocStringLen
VariantChangeType
SysFreeString
VariantClear
VariantCopy
msvcrt
memmove
_stricmp
_strnicmp
memchr
_purecall
__CxxFrameHandler
??3@YAXPAX@Z
strchr
sprintf
strstr
??2@YAPAXI@Z
_except_handler3
?terminate@@YAXXZ
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
msvcp60
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@PBD@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?max_size@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIXZ
?_Xlen@std@@YAXXZ
Sections
.text Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE