Static task
static1
Behavioral task
behavioral1
Sample
63aa3e02cd4c44401e5993579ccd60aa.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
63aa3e02cd4c44401e5993579ccd60aa.exe
Resource
win10v2004-20231215-en
General
-
Target
63aa3e02cd4c44401e5993579ccd60aa
-
Size
45KB
-
MD5
63aa3e02cd4c44401e5993579ccd60aa
-
SHA1
284361a44e28e1363825ab2a92141b5d742d3cf8
-
SHA256
03d5306082a6e4a1545e92b429490cc7669faeb576881aaaf125bf3d9f371848
-
SHA512
d252801de3b57ba26ef475baa4b826f8ff6ae0e91447606d736efcc167c36e5cf8f731d085601a4cfbd743fc767d96603e7299ba0b3cc136d5966698407aa791
-
SSDEEP
768:kxmV5WrNvxropy24mv0V3JX1apkFgBKc8kNbaU7/j9hrQAAH+uMKBOe:B5WBJMlg33PGmkNekj9hrQAiFr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 63aa3e02cd4c44401e5993579ccd60aa
Files
-
63aa3e02cd4c44401e5993579ccd60aa.exe windows:4 windows x86 arch:x86
c228dd4a8560fabd1fb51b42fe4d1c1d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentDirectoryA
GetFileSize
GetModuleFileNameA
GetModuleHandleA
GetPrivateProfileIntA
GetPrivateProfileStringA
GetProcAddress
GetTickCount
GetVersionExA
HeapAlloc
HeapFree
HeapReAlloc
GetACP
IsDebuggerPresent
LocalAlloc
LocalFree
MulDiv
ReadFile
RtlFillMemory
RtlMoveMemory
Sleep
VirtualAlloc
VirtualFree
VirtualProtect
WriteFile
ExitProcess
DeviceIoControl
CreateThread
CreateFileA
HeapSize
CloseHandle
wsock32
WSAStartup
WSACleanup
gethostbyname
user32
CopyIcon
GetWindowRgn
MonitorFromRect
RemoveMenu
ScrollDC
SetTimer
SwitchDesktop
wsprintfA
CharToOemA
gdi32
GdiFlush
SetBkColor
SetBkMode
SetTextColor
BitBlt
Sections
.text Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE