Static task
static1
Behavioral task
behavioral1
Sample
63376e625078f89183498f45e35b36aa140424deeaa09493039f9673fe606c6c.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
63376e625078f89183498f45e35b36aa140424deeaa09493039f9673fe606c6c.exe
Resource
win10v2004-20240508-en
General
-
Target
63376e625078f89183498f45e35b36aa140424deeaa09493039f9673fe606c6c
-
Size
137KB
-
MD5
6eaa44ff6b5a234c5814921101b1fc25
-
SHA1
140e6d2c74623fa491acb0c9d38259ce02c9f872
-
SHA256
63376e625078f89183498f45e35b36aa140424deeaa09493039f9673fe606c6c
-
SHA512
f03980997f42e3082e2217490f7a4bcb01ef9324de2d0a416c45dfea2a497ba16c5d573ea381efe7228548e3086133ad49b6be67e2d41baa3bad0c2e2e9d7fe2
-
SSDEEP
768:kytxZk/KuDmx7Czma06QMQJcW/Pn5T+6Onw47YEEhpdn8BAY/3Jn2uUm5nO4rGQV:kIbun90EQJciCNnrYFhD8R2VQVgd54v
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 63376e625078f89183498f45e35b36aa140424deeaa09493039f9673fe606c6c
Files
-
63376e625078f89183498f45e35b36aa140424deeaa09493039f9673fe606c6c.exe .vbs windows:4 windows x86 arch:x86 polyglot
56d36289945e1b8d661241dfad17ee85
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MapViewOfFile
CreateFileMappingA
GetFileSize
SetFileAttributesW
MultiByteToWideChar
lstrlenA
MoveFileExA
ReadFile
WinExec
GetTempFileNameA
SetFilePointer
CreateDirectoryA
ReleaseMutex
WaitForSingleObject
lstrcmpiA
lstrcpyA
lstrcmpA
GetEnvironmentVariableA
lstrcatA
GetDiskFreeSpaceA
GetModuleHandleA
Sleep
MoveFileA
GetLocalTime
GetCurrentProcess
FormatMessageA
GetLastError
GetTempPathA
GetComputerNameA
SetCurrentDirectoryA
GetSystemTime
WriteFile
VirtualFree
FileTimeToDosDateTime
SetEndOfFile
OutputDebugStringA
DosDateTimeToFileTime
ExitProcess
SetCurrentDirectoryW
SetFileTime
SystemTimeToFileTime
CreateProcessA
GetWindowsDirectoryA
GetVersion
CreateMutexA
CreateSemaphoreA
CreateThread
SizeofResource
LockResource
LoadResource
FindResourceA
DeviceIoControl
HeapFree
HeapAlloc
GetProcessHeap
GetDriveTypeA
GetLogicalDrives
GetLogicalDriveStringsA
FileTimeToSystemTime
ReleaseSemaphore
OpenSemaphoreA
UnmapViewOfFile
CreateFileA
GetFileTime
CloseHandle
DeleteFileA
FindFirstFileA
FindNextFileA
FindClose
GetModuleFileNameA
CopyFileA
SetFileAttributesA
GetShortPathNameA
lstrcpynA
LoadLibraryA
VirtualAlloc
GetProcAddress
user32
CharLowerBuffA
DialogBoxParamA
DefWindowProcA
SetTimer
ShowWindow
PostQuitMessage
EndDialog
KillTimer
wsprintfA
advapi32
InitializeSecurityDescriptor
LookupAccountNameA
AddAccessAllowedAce
SetSecurityDescriptorDacl
SetFileSecurityA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegSaveKeyA
RegOpenKeyExA
RegRestoreKeyA
RegCloseKey
RegSetValueExA
RegQueryValueExA
InitializeAcl
shell32
SHChangeNotify
SHGetSpecialFolderPathA
ole32
CoInitialize
CoUninitialize
shlwapi
PathAddBackslashA
PathFileExistsA
PathQuoteSpacesA
msvcrt
__CxxFrameHandler
_strcmpi
atol
isdigit
_except_handler3
memmove
strchr
wcslen
strncmp
strrchr
atoi
_strlwr
strncpy
ws2_32
gethostbyname
WSAStartup
WSACleanup
inet_addr
Sections
.data Size: 54KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 82KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ