Static task
static1
Behavioral task
behavioral1
Sample
63df26358a0e149f375c060c5c02a6a7.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
63df26358a0e149f375c060c5c02a6a7.exe
Resource
win10v2004-20231215-en
General
-
Target
63df26358a0e149f375c060c5c02a6a7
-
Size
2.0MB
-
MD5
63df26358a0e149f375c060c5c02a6a7
-
SHA1
25ad98a57dca92c2072c771f621055f9237c73f5
-
SHA256
05dc7e7cddfbc191f6d3937c6bb095f53d1bc9968155b755e6e49616c9f07f7c
-
SHA512
2435c216b978cb7c15e7ac6e5ad9c761fef24d684a87f8a60d3aaadc7c5892c45cd0d05e495bb9e309727454e549ec85f46f74ff2a0e8bf992e6d96f9305bf21
-
SSDEEP
49152:IULcV2hD/PD7Ajl4fAKcwE9SMCRzoWN4bQS/LQo/r4y:fcQbUhrS1R/Wl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 63df26358a0e149f375c060c5c02a6a7
Files
-
63df26358a0e149f375c060c5c02a6a7.exe windows:4 windows x86 arch:x86
690c9e79bb34f8d71799aa65a51d3c5d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FormatMessageA
GetSystemDefaultLCID
GetProcAddress
GetTempFileNameA
MulDiv
CreateProcessA
WaitForSingleObject
GetStartupInfoA
IsDBCSLeadByte
Sleep
CompareStringA
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
FreeLibrary
RemoveDirectoryA
FindNextFileA
WritePrivateProfileSectionA
WritePrivateProfileStringA
lstrcpynA
GetPrivateProfileSectionA
WriteFile
DeleteFileA
LocalAlloc
LockResource
LoadResource
FindResourceA
SizeofResource
GetModuleHandleA
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
MultiByteToWideChar
lstrcmpiA
GetDiskFreeSpaceA
HeapAlloc
GetProcessHeap
HeapFree
GetModuleFileNameA
ExitProcess
CreateFileA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
SetFileAttributesA
GetFileSize
ReadFile
SetFilePointer
FindFirstFileA
CreateDirectoryA
GetLastError
GetPrivateProfileStringA
FindClose
GetFileAttributesA
lstrcatA
lstrlenA
GetWindowsDirectoryA
lstrcpyA
GetSystemDirectoryA
GetTempPathA
MoveFileExA
LoadLibraryA
LocalFree
GetShortPathNameA
FlushFileBuffers
CloseHandle
SetStdHandle
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
LCMapStringW
LCMapStringA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStringTypeW
GetStringTypeA
GetOEMCP
GetACP
GetCPInfo
IsBadWritePtr
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetVersion
GetCommandLineA
RtlUnwind
user32
GetParent
GetDlgItem
SendDlgItemMessageA
EnableWindow
CheckRadioButton
SetWindowTextA
GetWindowTextA
LoadStringA
LoadImageA
MessageBoxA
IsDlgButtonChecked
GetDlgItemTextA
SetDlgItemTextA
ReleaseDC
GetDC
GetWindowLongA
SetFocus
PostMessageA
GetWindow
wsprintfA
GetDesktopWindow
DestroyWindow
CreateDialogParamA
DispatchMessageA
TranslateMessage
GetSysColor
GetSysColorBrush
FillRect
BeginPaint
DrawTextA
EndPaint
GetClientRect
ScreenToClient
MoveWindow
SetParent
MapDialogRect
GetNextDlgTabItem
GetWindowRect
CreateDialogIndirectParamA
IsWindow
InvalidateRect
IsWindowEnabled
ShowWindow
UpdateWindow
IsDialogMessageA
SetWindowPos
GetActiveWindow
SetActiveWindow
CharNextA
LoadIconA
SendMessageA
PeekMessageA
SetWindowLongA
gdi32
DeleteObject
CreatePalette
RealizePalette
GetDeviceCaps
CreateDIBitmap
GetObjectA
SelectPalette
EnumFontFamiliesExA
GetTextExtentPointA
GetStockObject
TextOutA
DeleteDC
SelectObject
CreateCompatibleDC
SetBkMode
BitBlt
SetTextColor
CreateSolidBrush
SetBkColor
CreateFontIndirectA
advapi32
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
shell32
ShellExecuteA
SHBrowseForFolderA
SHGetPathFromIDListA
SHGetMalloc
lz32
LZOpenFileA
LZCopy
LZClose
comctl32
ord17
Sections
.text Size: 68KB - Virtual size: 65KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 72KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ