Static task
static1
Behavioral task
behavioral1
Sample
63a24c357c73b30877763122b5b70482.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
63a24c357c73b30877763122b5b70482.exe
Resource
win10v2004-20231215-en
General
-
Target
63a24c357c73b30877763122b5b70482
-
Size
167KB
-
MD5
63a24c357c73b30877763122b5b70482
-
SHA1
dd433be94bbb36abb4d04fe52788e4e362d1577f
-
SHA256
51c4a8f603004d1cb3a4fadbbae5bb9f1fa58383cc43ef7b6c49fc13541f4e5b
-
SHA512
70775c33595e58346c972f51bb454328c4c82ef192121e835c5f8a8eb63cadea0e92ce43d64d7839f07bd38cbbc49b77024b2ab1385fcd1bb7ae6b6ccb172ca9
-
SSDEEP
3072:vxsJHIFgWwMHV8wZsiT/HFu5TrgmTXPFD0lmDO8ovYes5jR69VG12D:vxyInw8L5uPZ0lFn6U9U
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 63a24c357c73b30877763122b5b70482
Files
-
63a24c357c73b30877763122b5b70482.exe windows:4 windows x86 arch:x86
c121fdb8d1d665bae8dbc60907fa9d2d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
SHQueryInfoKeyA
advapi32
RegOpenKeyExA
shell32
SHFileOperationA
SHGetFileInfoA
Shell_NotifyIconA
DragQueryFileA
ole32
PropVariantClear
kernel32
GlobalFindAtomA
DeleteCriticalSection
GetFileAttributesA
GetStringTypeW
GetCurrentThread
lstrcmpA
SetEndOfFile
LocalAlloc
GetCurrentThreadId
GetFileSize
ResetEvent
FormatMessageA
SetErrorMode
RaiseException
WriteFile
ExitThread
CompareStringA
GetStartupInfoA
FindClose
LoadLibraryExA
GetThreadLocale
lstrcpyA
MoveFileExA
DeleteFileA
ExitProcess
GetProcAddress
GetDateFormatA
FindFirstFileA
GetStringTypeA
GetModuleHandleA
GetVersion
GetCurrentProcessId
GetLocaleInfoA
lstrcatA
lstrcmpiA
GetDiskFreeSpaceA
FreeLibrary
MulDiv
SetFilePointer
CloseHandle
VirtualFree
SetThreadLocale
SetHandleCount
LoadResource
GetLastError
FreeResource
HeapAlloc
CreateThread
VirtualQuery
VirtualAllocEx
GetFileType
FindResourceA
GetSystemDefaultLangID
GetVersionExA
GetCommandLineA
VirtualAlloc
LocalReAlloc
GetACP
HeapFree
LoadLibraryA
GlobalAddAtomA
LocalFree
GetTickCount
GetProcessHeap
msvcrt
atan
strcmp
memmove
oleaut32
RegisterTypeLib
SafeArrayPtrOfIndex
SysReAllocStringLen
user32
GetMenuState
IsChild
GetWindow
GetKeyNameTextA
GetSysColor
GetMenuStringA
CallWindowProcA
GetScrollInfo
EnableScrollBar
DrawMenuBar
GetActiveWindow
FindWindowA
CharLowerBuffA
GetWindowTextA
GetScrollRange
EnumWindows
GetMessagePos
GetCursor
IsWindowVisible
GetDCEx
SetWindowPos
GetSubMenu
CheckMenuItem
CreateWindowExA
FrameRect
GetSysColorBrush
IsDialogMessageA
CreateMenu
GetFocus
GetMenuItemID
GetParent
FillRect
GetMenuItemInfoA
GetPropA
GetScrollPos
Sections
CODE Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 122KB - Virtual size: 122KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
BSS Size: 1024B - Virtual size: 679B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.init Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ