Static task
static1
Behavioral task
behavioral1
Sample
63dff9d6f301156208c329bf73781c44.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
63dff9d6f301156208c329bf73781c44.exe
Resource
win10v2004-20231222-en
General
-
Target
63dff9d6f301156208c329bf73781c44
-
Size
76KB
-
MD5
63dff9d6f301156208c329bf73781c44
-
SHA1
895e1a3e971c1be9ec23b46f09f34a66f3f35085
-
SHA256
cb58deb09fa4aa2117d25b4d0e90cadc67472f76b5657010815f8aea8e5dc21a
-
SHA512
bf951ac391635444c64cd5c5ee944d63a1f2f0e1d0829cd30e340948b0cf7a0854ee60d768b44a2adfc9e7986fcfdb7446bcfd8b3ffd1ff1785a9cd4142c6776
-
SSDEEP
1536:gvBpjwKa9PwOv1+a+I9CQs7GS61mxk9wnjIcBFRosCps+4a:g5pj89313+p/Czd9wLBFRosCpso
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 63dff9d6f301156208c329bf73781c44
Files
-
63dff9d6f301156208c329bf73781c44.exe windows:4 windows x86 arch:x86
750be93f5b59368a80d37e385e4ca5a7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteFileA
SetThreadPriority
SetPriorityClass
GetCurrentProcess
GetVersionExA
GetWindowsDirectoryA
SetSystemPowerState
GetSystemDirectoryA
MoveFileA
FindClose
FindNextFileA
lstrcmpA
FindFirstFileA
WinExec
GetFileAttributesA
GetCommandLineA
CreateDirectoryA
GlobalMemoryStatus
GetSystemInfo
GetComputerNameA
TerminateThread
GetExitCodeThread
GetProcAddress
LoadLibraryA
WaitForSingleObject
TerminateProcess
OpenProcess
lstrcpyA
Sleep
lstrcmpiA
CreateThread
ReadFile
CopyFileA
SetFileAttributesA
SetFileTime
SetFilePointer
lstrcpynA
lstrlenA
GetDiskFreeSpaceA
GetDriveTypeA
lstrcatA
WriteFile
HeapFree
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
UnhandledExceptionFilter
LCMapStringW
LCMapStringA
MultiByteToWideChar
WideCharToMultiByte
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
ExitProcess
GetVersion
CloseHandle
CreateFileA
GetStartupInfoA
GetModuleHandleA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetLastError
HeapAlloc
GetStringTypeW
RtlUnwind
GetStringTypeA
GetTimeZoneInformation
SetStdHandle
FlushFileBuffers
GetExitCodeProcess
CreateProcessA
GetCPInfo
GetACP
GetOEMCP
SetEnvironmentVariableA
CompareStringW
SetEndOfFile
CompareStringA
user32
ExitWindowsEx
CharToOemA
ToAscii
wsprintfA
GetKeyboardState
GetKeyNameTextA
GetWindowTextA
GetActiveWindow
CallNextHookEx
UnhookWindowsHookEx
DispatchMessageA
GetMessageA
SetKeyboardState
PeekMessageA
SetWindowsHookExA
EnumDisplaySettingsA
ChangeDisplaySettingsA
GetForegroundWindow
IsWindow
ShowWindow
SetWindowTextA
EnableWindow
CharUpperA
SystemParametersInfoA
GetDesktopWindow
MessageBoxA
gdi32
DeleteObject
BitBlt
SelectObject
CreateDIBSection
DeleteDC
CreateCompatibleDC
GetDeviceCaps
CreateDCA
GetDIBColorTable
advapi32
RegCloseKey
RegSetValueExA
RegCreateKeyA
GetUserNameA
RegQueryValueExA
RegOpenKeyExA
shell32
SHFileOperationA
ShellExecuteA
rpcrt4
NdrClientInitializeNew
RpcMgmtStopServerListening
RpcServerRegisterIf
RpcServerListen
I_RpcGetCurrentCallHandle
NdrConformantStringBufferSize
NdrGetBuffer
NdrConformantStringMarshall
NdrSendReceive
NdrFreeBuffer
NdrServerInitializeNew
NdrConvert
NdrConformantStringUnmarshall
RpcRaiseException
RpcServerUnregisterIf
RpcServerUseProtseqEpA
winmm
PlaySoundA
ws2_32
socket
bind
WSAStartup
accept
WSACleanup
closesocket
htons
listen
send
recv
Sections
.text Size: 48KB - Virtual size: 46KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ