Static task
static1
Behavioral task
behavioral1
Sample
639e7b74401aef3cceb3243588f01305d73b59a16496b463e519b7a49b676305.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
639e7b74401aef3cceb3243588f01305d73b59a16496b463e519b7a49b676305.exe
Resource
win10v2004-20220901-en
General
-
Target
639e7b74401aef3cceb3243588f01305d73b59a16496b463e519b7a49b676305
-
Size
15KB
-
MD5
6b0c3564a90b43cede04c74ff4e11adb
-
SHA1
79b88535fbd39b531ddbb02a015c24b1524cdbba
-
SHA256
639e7b74401aef3cceb3243588f01305d73b59a16496b463e519b7a49b676305
-
SHA512
2d84c17ba8b5f07632c8236c3e5552ded330c8699cf1624668d3cfeba91bcdbc317c068fd4c011b0bb984f8913b8c3d6c140e1040016c8bac5c37e2ca804ce16
-
SSDEEP
96:CnYBxbTmBBjkcfrAlhNHc2BywoAJPQYi3K1DntAfdomPdHWsyzUpNEw7b:Y+bTQBk4Alh9pBpbtQYQK5YouI1UF7b
Malware Config
Signatures
Files
-
639e7b74401aef3cceb3243588f01305d73b59a16496b463e519b7a49b676305.exe windows x86
b093b9b6223af7f9e72d34d8765aa77f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
RegisterServiceCtrlHandlerA
SetServiceStatus
StartServiceCtrlDispatcherA
kernel32
CloseHandle
CreateProcessA
ExitProcess
GetThreadContext
ResumeThread
SetThreadContext
VirtualAllocEx
WriteProcessMemory
msvcrt
memset
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 28B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 48B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1024B - Virtual size: 548B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE