Static task
static1
Behavioral task
behavioral1
Sample
63aefabb6af4ae68083d579a17be09f3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
63aefabb6af4ae68083d579a17be09f3.exe
Resource
win10v2004-20231222-en
General
-
Target
63aefabb6af4ae68083d579a17be09f3.bin
-
Size
49KB
-
MD5
63aefabb6af4ae68083d579a17be09f3
-
SHA1
2971fecc8434c5c831cceab749f49f9d60c5eb8f
-
SHA256
b56d8bc09931aa0380754a344a35132293b0ec4f76635842c67fa1395b8b7e7c
-
SHA512
5324d5f9a7256c1bb3674f28d0691f339d8e366945c2aea030150decd1fde9e5d10f9e06bf9bdfa108ab7b3e37bbc0297baf213e338844f8a05b2648a3021e9b
-
SSDEEP
1536:I5M0FUqL+XCnJK5NCyY5ibLca2h1orNKCO6oU:WM0FUiNnI/zbLcRK8l6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 63aefabb6af4ae68083d579a17be09f3.bin
Files
-
63aefabb6af4ae68083d579a17be09f3.bin.exe windows:5 windows x86 arch:x86
7e6a01c0543affd4a15a8ef1d0c074bf
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ResetEvent
lstrcpyW
GetProcessHeap
GetSystemTime
GetDriveTypeW
SetFileTime
GetModuleFileNameA
CloseHandle
GetExitCodeProcess
SetFilePointer
SetLastError
GetTickCount
GetCommandLineA
GetFileSize
GetCurrentProcessId
SetFileAttributesW
Sleep
GetModuleHandleA
UnmapViewOfFile
GetLastError
GetVersionExW
FindNextFileW
GetLogicalDrives
lstrcatA
CreateEventW
GetFileSizeEx
InitializeCriticalSection
EnterCriticalSection
HeapFree
FlushFileBuffers
OpenMutexW
SetEndOfFile
lstrcmpiW
WriteFile
GetLocalTime
DeleteFileW
GetComputerNameW
lstrlenA
SystemTimeToFileTime
WaitForSingleObject
CreateFileMappingW
GetFileTime
CreateThread
ExpandEnvironmentStringsW
GetUserDefaultUILanguage
SetThreadPriority
GetProcessTimes
lstrcpynW
FindResourceW
GlobalUnlock
GetModuleFileNameW
lstrcmpiA
HeapAlloc
GetTempPathW
IsBadReadPtr
DisconnectNamedPipe
ReleaseMutex
ReadFile
FindFirstFileW
CreateFileW
SetEvent
GetCurrentThreadId
GlobalLock
GetThreadPriority
HeapReAlloc
CreateDirectoryW
MapViewOfFile
lstrcatW
MultiByteToWideChar
FindClose
lstrlenW
LeaveCriticalSection
MoveFileExW
CreateProcessW
CopyFileW
CreateMutexW
GetSystemTimeAsFileTime
WriteProcessMemory
lstrcpyA
OpenProcess
WideCharToMultiByte
GetTempFileNameW
GetTimeZoneInformation
user32
GetDlgItemTextW
CloseWindowStation
OpenDesktopA
OpenWindowStationA
GetForegroundWindow
DispatchMessageW
PeekMessageA
Sections
.vynur Size: 39KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dcf Size: 2KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.qfyzej Size: 7KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ