Static task
static1
Behavioral task
behavioral1
Sample
63dc0a3def7ff4149b3def1dbc60a743.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
63dc0a3def7ff4149b3def1dbc60a743.exe
Resource
win10v2004-20231215-en
General
-
Target
63dc0a3def7ff4149b3def1dbc60a743
-
Size
488KB
-
MD5
63dc0a3def7ff4149b3def1dbc60a743
-
SHA1
0719543f1b70afe7e26168056dbbf11b53fbf6af
-
SHA256
4524e3416e7f0a4c31bbdc89be462397e718ce9eae4f6647eaba56f28c17a7e4
-
SHA512
8cfafba59e8d1322188f9487d05995f07253cfa9907c7e551a336e199026d0ddb99256a7973bb55b62fa8e6c4198012232533c7d614a41bfd02a3a5c38351843
-
SSDEEP
6144:LvlQEcsHmmABIoMIyOSoBFnOEGtavUOC3ud2zsVFlf+RF0o72W7RFr9yzSvqooO6:pQEhOTcoBFnOFQHld2zaeVt77YzSv9t
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 63dc0a3def7ff4149b3def1dbc60a743
Files
-
63dc0a3def7ff4149b3def1dbc60a743.exe windows:4 windows x86 arch:x86
c5d5650ac469ff4a4b9a4f35501cb5f9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
LoadImageA
GetPriorityClipboardFormat
FlashWindowEx
DialogBoxIndirectParamA
CreateDialogIndirectParamW
CallMsgFilter
FindWindowW
GetCapture
RegisterClassA
ClientToScreen
BringWindowToTop
RegisterClipboardFormatW
DdeUnaccessData
GetClientRect
MapVirtualKeyExW
EndDialog
RegisterClassExA
GetMessageTime
SetActiveWindow
gdi32
EnumFontsW
comctl32
InitCommonControlsEx
kernel32
HeapReAlloc
LocalLock
GetCurrentProcess
LeaveCriticalSection
InterlockedExchange
FreeEnvironmentStringsA
GetLocaleInfoA
QueryPerformanceCounter
GetSystemTime
DeleteCriticalSection
VirtualAlloc
TlsFree
ExitProcess
GetLastError
GetEnvironmentStringsW
GetConsoleOutputCP
HeapAlloc
GetStringTypeW
SetLastError
TerminateProcess
RtlUnwind
GetACP
GetCurrentThreadId
InterlockedDecrement
IsBadWritePtr
GetCurrentProcessId
CompareStringA
GetCompressedFileSizeA
GetSystemTimeAsFileTime
CloseHandle
GetCurrentThread
lstrcmpiA
CreateMutexA
TlsSetValue
SetFilePointer
WriteProfileSectionA
SetStdHandle
GetLocalTime
GetProcAddress
TlsAlloc
PulseEvent
GetCommandLineA
HeapDestroy
HeapCreate
VirtualQuery
EnterCriticalSection
ReadFile
GetFileType
InterlockedIncrement
RtlZeroMemory
TlsGetValue
CreateNamedPipeA
VirtualFree
GetModuleFileNameA
HeapFree
WideCharToMultiByte
CompareStringW
LocalHandle
FreeEnvironmentStringsW
SetHandleCount
LoadLibraryA
GetOEMCP
CreateDirectoryExA
LCMapStringW
ReadConsoleA
GetTimeZoneInformation
GetEnvironmentStrings
UnhandledExceptionFilter
OpenMutexA
ConnectNamedPipe
GetVersion
GetStartupInfoA
lstrcpy
GetStdHandle
GetTickCount
GetStringTypeA
EnumResourceTypesA
WriteFile
GetCPInfo
MultiByteToWideChar
GetModuleHandleA
SetEnvironmentVariableA
InitializeCriticalSection
LCMapStringA
FlushFileBuffers
Sections
.text Size: 158KB - Virtual size: 158KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 312KB - Virtual size: 311KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ