Static task
static1
Behavioral task
behavioral1
Sample
63e4dab0665b942d15074769d8e53102087f8df376c721c56a35ae7bf721653b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
63e4dab0665b942d15074769d8e53102087f8df376c721c56a35ae7bf721653b.exe
Resource
win10v2004-20220812-en
General
-
Target
63e4dab0665b942d15074769d8e53102087f8df376c721c56a35ae7bf721653b
-
Size
190KB
-
MD5
6d3a641f45b1957e2570ffb86385d3aa
-
SHA1
33ab8a8be6b507ed34a67dab32843bb69189d658
-
SHA256
63e4dab0665b942d15074769d8e53102087f8df376c721c56a35ae7bf721653b
-
SHA512
ecce332f18a33c8ced9e49c7eaa9b371cdb5858b9d850d1ffd1df1a0e60592c045cc8ba1ee32a2bb9e8e312839806dc2f66a896a02341f0ece61570bac8f80b1
-
SSDEEP
3072:x8bdHYQMWy4ITgft/5NiB5ON7HIJlIaiYG1m38XCLMFbIfIyvX9C0/r4j:AdHxjhIo/5I4UIp88SgLy1dzg
Malware Config
Signatures
Files
-
63e4dab0665b942d15074769d8e53102087f8df376c721c56a35ae7bf721653b.exe windows x86
776936c154d35c96a366bb33f4284717
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteFileW
CreateDirectoryA
GetCurrentProcess
GetModuleFileNameA
MultiByteToWideChar
GetVersionExA
FindResourceA
FreeLibrary
ExpandEnvironmentStringsA
LoadLibraryA
LoadLibraryExA
CompareStringA
WideCharToMultiByte
IsDBCSLeadByte
GetCPInfo
GetCurrentDirectoryA
CopyFileA
GetEnvironmentVariableA
CreateProcessA
GetTempPathA
WritePrivateProfileStringA
GetShortPathNameA
GetWindowsDirectoryA
MoveFileExA
RemoveDirectoryA
SetCurrentDirectoryA
Sleep
DeleteFileA
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
LCMapStringW
LCMapStringA
IsValidCodePage
GetOEMCP
GetACP
RtlUnwind
GetConsoleMode
GetConsoleCP
HeapSize
InterlockedDecrement
GetCurrentThreadId
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
InitializeCriticalSectionAndSpinCount
GetVersion
SetHandleCount
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
ExitProcess
MoveFileA
SetFileAttributesA
GetFileAttributesW
GetFileAttributesA
GetModuleHandleA
GetProcAddress
WriteFile
SetLastError
GetStdHandle
ReadFile
CreateFileW
CreateFileA
GetFileType
SetEndOfFile
SetFilePointer
GetLastError
FlushFileBuffers
GetProcessHeap
CloseHandle
GetModuleHandleW
HeapCreate
VirtualAlloc
VirtualFree
DeleteCriticalSection
GetStartupInfoA
GetCommandLineA
HeapReAlloc
LeaveCriticalSection
RaiseException
HeapAlloc
HeapFree
GetSystemTimeAsFileTime
SetStdHandle
EnterCriticalSection
user32
GetDlgItem
EnableWindow
ReleaseDC
LoadIconA
MessageBoxA
SetForegroundWindow
GetSysColor
SendDlgItemMessageA
SetDlgItemTextA
GetDC
LoadStringA
GetWindowRect
GetClientRect
SetWindowPos
GetWindowTextA
SetWindowTextA
GetSystemMetrics
GetWindow
GetClassNameA
GetWindowLongA
SetWindowLongA
DialogBoxParamA
EndDialog
CheckDlgButton
IsDlgButtonChecked
GetParent
SendMessageA
InvalidateRect
gdi32
CreateFontA
DeleteObject
GetDeviceCaps
advapi32
RegSetValueExA
RegCreateKeyExA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shell32
ShellExecuteA
SHGetPathFromIDListA
SHGetSpecialFolderLocation
SHGetMalloc
SHChangeNotify
SHFileOperationA
ole32
OleUninitialize
OleInitialize
CoCreateInstance
Sections
.text Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.lrdata Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE