Static task
static1
Behavioral task
behavioral1
Sample
643bde4bc7369525f74072981418e864.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
643bde4bc7369525f74072981418e864.exe
Resource
win10v2004-20231215-en
General
-
Target
643bde4bc7369525f74072981418e864
-
Size
49KB
-
MD5
643bde4bc7369525f74072981418e864
-
SHA1
8f903c0c2bc54b205af3b851e559995b5a38fe1c
-
SHA256
a2c19c51209c232658325c25ef725142b20fbc93a4040e6661fc2a7eae2349ad
-
SHA512
024d0ac9b767c84bc246a50be97e900c50cc07d308d23019b556c4fc2eaeedfbd3c56f4083c30fdb39a42aea4aab5b08b252498ccf51dc74c776d047894404bd
-
SSDEEP
768:7aqIz4iqce034mzOYuNMoFoCI/XqH5G3KFnVvSaatN6hRfFgRTVKeOBqmKUFG5zK:7JTS4zNfI/XT3KFnVvef6vf4VnKB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 643bde4bc7369525f74072981418e864
Files
-
643bde4bc7369525f74072981418e864.exe windows:5 windows x86 arch:x86
005c604fd5499b6cca989d2162632ff3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTempPathW
ReleaseMutex
GetTempFileNameW
GetSystemTime
lstrcatW
Sleep
lstrcatA
lstrcpyA
lstrcpyW
SetEndOfFile
lstrcmpiW
CreateFileW
GetFileTime
ResetEvent
FindResourceW
lstrcmpiA
GetLocalTime
GetTickCount
SystemTimeToFileTime
lstrlenA
SetEvent
WaitForSingleObject
IsBadReadPtr
SetFileAttributesW
OpenProcess
GetModuleFileNameA
MultiByteToWideChar
WriteFile
ReadFile
HeapAlloc
GetSystemTimeAsFileTime
GetCommandLineA
FindFirstFileW
EnterCriticalSection
GetModuleFileNameW
MoveFileExW
InitializeCriticalSection
GetProcessHeap
GetVersionExW
CreateMutexW
GetLastError
GetFileSize
LeaveCriticalSection
FindClose
ExpandEnvironmentStringsW
HeapReAlloc
WideCharToMultiByte
CopyFileW
GetComputerNameW
lstrcpynW
DeleteFileW
MapViewOfFile
HeapFree
GetUserDefaultUILanguage
FlushFileBuffers
DisconnectNamedPipe
SetThreadPriority
OpenMutexW
GetProcessTimes
SetFileTime
CloseHandle
GetThreadPriority
WriteProcessMemory
GetFileSizeEx
CreateProcessW
CreateFileMappingW
SetFilePointer
GetCurrentThreadId
CreateThread
GetTimeZoneInformation
FindNextFileW
GlobalUnlock
GetExitCodeProcess
SetLastError
UnmapViewOfFile
GetDriveTypeW
lstrlenW
GetCurrentProcessId
CreateEventW
GetModuleHandleA
GetLogicalDrives
GlobalLock
CreateDirectoryW
user32
GetDlgItemTextW
GetMessageW
GetWindowTextW
GetIconInfo
SendMessageW
SetThreadDesktop
MsgWaitForMultipleObjects
GetForegroundWindow
Sections
.urgx Size: 39KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ilox Size: 2KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rqv Size: 7KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ