Static task
static1
Behavioral task
behavioral1
Sample
63abce3822832edde0c76548f82e103b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
63abce3822832edde0c76548f82e103b.exe
Resource
win10v2004-20231222-en
General
-
Target
63abce3822832edde0c76548f82e103b
-
Size
624KB
-
MD5
63abce3822832edde0c76548f82e103b
-
SHA1
7f5b03c174d51efe3a0e81124430042f7257516e
-
SHA256
59a2044eb9d669f23c805d810a7a9253c622a93dd3c18c1d49bd38e356afea76
-
SHA512
5e0818ce307048bf3bed6479d1328bef83e6e16c90bac0e61e3219b99a3d19dad2c04a40b89746bf105ac02ccd6d26fe061459f89bfec3faad5ed358c0de2453
-
SSDEEP
12288:VYnLoYMh+9UC1vIndXsensopYftIe3TpgnW4lWkaDHI1MqKWoZE:VnE9L16Xdnso2fWYTpr4faDHI1MqK7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 63abce3822832edde0c76548f82e103b
Files
-
63abce3822832edde0c76548f82e103b.exe windows:5 windows x86 arch:x86
b2baf08478363b4d6373ba778b4aa537
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
urlmon
ObtainUserAgentString
shell32
SHGetSpecialFolderPathA
ShellExecuteW
SHGetKnownFolderPath
wininet
InternetReadFile
InternetSetOptionA
InternetOpenUrlW
InternetCrackUrlW
InternetOpenW
InternetCloseHandle
InternetConnectW
HttpOpenRequestW
HttpSendRequestW
InternetQueryOptionW
InternetSetOptionW
HttpQueryInfoW
InternetErrorDlg
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
shlwapi
PathFileExistsW
StrCmpIW
PathAppendW
StrStrIW
StrRChrIW
PathFindFileNameW
StrChrIW
StrChrA
PathBuildRootW
PathGetDriveNumberW
PathRemoveFileSpecW
advapi32
RegOpenKeyExA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
GetSecurityDescriptorSacl
SetNamedSecurityInfoW
GetFileSecurityW
ImpersonateSelf
MapGenericMask
AccessCheck
RevertToSelf
SetFileSecurityW
OpenThreadToken
AllocateAndInitializeSid
EqualSid
FreeSid
RegQueryValueExW
GetLengthSid
SetTokenInformation
CreateProcessAsUserW
DuplicateTokenEx
CreateProcessWithTokenW
RegOpenKeyExW
OpenProcessToken
GetTokenInformation
GetSidSubAuthorityCount
GetSidSubAuthority
RegCreateKeyExW
RegSetValueExW
RegCloseKey
RegQueryValueExA
kernel32
FreeEnvironmentStringsW
GetStartupInfoA
GetEnvironmentStringsW
GetConsoleMode
GetConsoleCP
GetCommandLineW
SetStdHandle
ReadFile
GetLocaleInfoA
GetStringTypeA
SetConsoleCtrlHandler
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
InitializeCriticalSectionAndSpinCount
LoadLibraryA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
FlushFileBuffers
GetLocaleInfoW
CreateFileA
SetEndOfFile
GetProcessHeap
CompareStringA
CompareStringW
SetEnvironmentVariableA
SetUnhandledExceptionFilter
IsDebuggerPresent
GetTimeZoneInformation
GetSystemTimeAsFileTime
GetStartupInfoW
SetHandleCount
MapViewOfFile
FreeLibrary
GetProcAddress
LoadLibraryW
GetCurrentThreadId
GetModuleFileNameA
lstrlenW
CopyFileW
GetLastError
SetFileAttributesW
GetFileAttributesW
CreateDirectoryW
CloseHandle
OpenProcess
GetModuleHandleW
GetModuleFileNameW
GetPrivateProfileStringW
lstrcpynW
GetShortPathNameW
GetCurrentProcessId
GetLongPathNameW
GetPrivateProfileIntW
LocalFree
GetCurrentProcess
WritePrivateProfileStringW
GetPrivateProfileStringA
FormatMessageW
OutputDebugStringW
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
CreateFileW
DeleteFileW
GetFileSize
WideCharToMultiByte
MultiByteToWideChar
GetVersionExW
lstrcpynA
GetTempPathW
InitializeCriticalSection
lstrcmpiA
GetTempFileNameW
GetCurrentThread
GetDriveTypeW
InterlockedDecrement
IsBadReadPtr
GetSystemDirectoryW
GetLocalTime
UnmapViewOfFile
GetTickCount
WaitForSingleObject
OpenEventW
FindClose
FindNextFileW
FindFirstFileW
UnhandledExceptionFilter
CreateFileMappingW
CreateProcessW
ReleaseMutex
QueryPerformanceFrequency
VirtualQuery
SetEvent
Sleep
OpenFileMappingW
CreateMutexW
QueryPerformanceCounter
WriteFile
SetFilePointer
FindNextFileA
FindFirstFileA
HeapSize
GetModuleHandleA
IsValidCodePage
GetOEMCP
GetACP
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetStdHandle
ExitProcess
VirtualAlloc
FatalAppExitA
VirtualFree
HeapDestroy
HeapCreate
GetStringTypeW
GetCPInfo
LCMapStringW
LCMapStringA
HeapReAlloc
GetFileType
TerminateProcess
RaiseException
RtlUnwind
PeekNamedPipe
GetFileInformationByHandle
FileTimeToLocalFileTime
InterlockedIncrement
InterlockedCompareExchange
InterlockedExchange
HeapFree
HeapAlloc
FileTimeToSystemTime
user32
GetWindowThreadProcessId
GetMessageW
TranslateMessage
DispatchMessageW
PostThreadMessageW
FindWindowW
GetWindow
GetWindowLongW
PostMessageW
KillTimer
SetTimer
RegisterWindowMessageW
GetForegroundWindow
wsprintfW
GetMonitorInfoW
GetShellWindow
MonitorFromWindow
IsWindow
SendMessageW
ole32
CoCreateGuid
CoTaskMemFree
oleaut32
SysFreeString
SysAllocString
CreateErrorInfo
GetErrorInfo
VariantChangeType
VariantClear
VariantInit
SetErrorInfo
ws2_32
inet_addr
ntohl
Sections
.text Size: 352KB - Virtual size: 352KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 83KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
PACK Size: 160KB - Virtual size: 424KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE