Static task
static1
Behavioral task
behavioral1
Sample
63d5b00bd3317113115b3153dbb2e73c.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
63d5b00bd3317113115b3153dbb2e73c.exe
Resource
win10v2004-20231222-en
General
-
Target
63d5b00bd3317113115b3153dbb2e73c
-
Size
68KB
-
MD5
63d5b00bd3317113115b3153dbb2e73c
-
SHA1
cead2f7f55cc24b41093a137d143cfd37461ab79
-
SHA256
daf4cdf33a735c66f913c2679588fcb4fca29ed83426c57b5cf7e9d26e1f85f9
-
SHA512
f7f244317ee66c78d37beddb85c8aead511fc3856693f15920e6abd2d3d4e12f171158f8c3f94053da9c0baac801fb1606fc09a1a8a4211e867db3df42bafa08
-
SSDEEP
1536:dLvcgTt5TmzGSW/F3FnToIfJ2u/0nO5+Hrv:1vcgTt5uGSW/F3tTBfJ2u/04+Hj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 63d5b00bd3317113115b3153dbb2e73c
Files
-
63d5b00bd3317113115b3153dbb2e73c.exe windows:4 windows x86 arch:x86
0e20df2b024f3c769e6cff164f29779d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersion
TerminateThread
FreeLibrary
WriteFile
CreateFileA
ReadFile
GetModuleHandleA
GetLocalTime
CreateDirectoryA
FindFirstFileA
FindNextFileA
FindClose
SetFileAttributesA
DeleteFileA
LocalAlloc
LocalFree
GetCurrentProcess
LoadLibraryA
GetProcAddress
InterlockedExchange
OpenProcess
TerminateProcess
GetComputerNameA
GetVersionExA
GetDriveTypeA
GetDiskFreeSpaceExA
GlobalMemoryStatus
GetCurrentThreadId
GetTickCount
GetLastError
ExitProcess
WaitForSingleObject
CloseHandle
CreateThread
Sleep
user32
MessageBoxA
GetSystemMetrics
SetThreadDesktop
OpenDesktopA
SendMessageA
CloseWindow
CreateWindowExA
SetProcessWindowStation
OpenWindowStationA
GetThreadDesktop
GetProcessWindowStation
CloseDesktop
CloseWindowStation
IsWindow
ToAscii
GetKeyboardState
GetKeyNameTextA
GetWindowTextA
GetActiveWindow
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
ExitWindowsEx
TranslateMessage
DispatchMessageA
GetMessageA
UpdateWindow
RegisterClassA
LoadCursorA
LoadIconA
DefWindowProcA
wsprintfA
gdi32
StartDocA
StartPage
EndPage
DeleteObject
DeleteDC
GetDIBits
BitBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
CreateDCA
GetStockObject
EndDoc
winspool.drv
EnumPrintersA
advapi32
LookupPrivilegeValueA
StartServiceA
CloseServiceHandle
EnumServicesStatusA
QueryServiceConfigA
QueryServiceConfig2A
DeleteService
ControlService
OpenSCManagerA
OpenServiceA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
GetUserNameA
AdjustTokenPrivileges
OpenProcessToken
QueryServiceStatus
shell32
ShellExecuteA
ws2_32
gethostbyname
htons
send
WSAStartup
socket
WSAGetLastError
closesocket
connect
recv
avicap32
capGetDriverDescriptionA
capCreateCaptureWindowA
wininet
InternetReadFile
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
winmm
mixerSetControlDetails
mixerClose
mixerGetLineInfoA
mixerOpen
mixerGetControlDetailsA
mixerGetLineControlsA
msvcrt
fopen
fseek
_strtime
_strdate
fprintf
fclose
_controlfp
__CxxFrameHandler
_ftol
sprintf
??2@YAPAXI@Z
??3@YAXPAX@Z
printf
_CxxThrowException
fputc
exit
malloc
free
fread
fwrite
fgetc
scanf
??1type_info@@UAE@XZ
_exit
_XcptFilter
__p___initenv
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_except_handler3
__set_app_type
atoi
Sections
.text Size: 40KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE