Static task
static1
Behavioral task
behavioral1
Sample
63eb869969f65435013702e83f0b76c4899d8e511bf214b258dac2385564b0ca.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
63eb869969f65435013702e83f0b76c4899d8e511bf214b258dac2385564b0ca.exe
Resource
win10v2004-20220812-en
General
-
Target
63eb869969f65435013702e83f0b76c4899d8e511bf214b258dac2385564b0ca
-
Size
272KB
-
MD5
4421453fd510058c907f8d9977a5a84f
-
SHA1
9b044256d3ae2d37cc37a0bd98b3b8044684a47a
-
SHA256
63eb869969f65435013702e83f0b76c4899d8e511bf214b258dac2385564b0ca
-
SHA512
d1f4ffa9d37e199f907dbc459c03c88e52634494430efc9778168ea86cfabe76cea36cee4fb9f904840622dab35162c672f9246c9553106a78c54af675e7a14b
-
SSDEEP
6144:5bmYciLhqPcTReKuUdw/swfoJ035YowWC2G1aQZzVbZ4IbiMIjB:JfciLhqP/hUdmTp/i1aYZbZ499
Malware Config
Signatures
Files
-
63eb869969f65435013702e83f0b76c4899d8e511bf214b258dac2385564b0ca.exe windows x86
17c639f0b5712e87efc5cb0ca9bc8677
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetConsoleOutputCP
GlobalGetAtomNameA
IsValidCodePage
SetFilePointer
MultiByteToWideChar
TlsAlloc
TlsSetValue
TlsGetValue
GetTimeFormatA
HeapReAlloc
EnumResourceNamesA
VirtualAlloc
HeapSize
RtlUnwind
GetACP
CreateHardLinkA
GetLocaleInfoA
SetStdHandle
WriteConsoleA
GetCPInfo
GetDateFormatA
GetOEMCP
RaiseException
user32
CharNextA
MessageBoxA
DispatchMessageA
DispatchMessageW
PeekMessageA
GetDesktopWindow
LoadStringA
wsprintfA
rpcrt4
RpcStringFreeA
shell32
SHGetFolderLocation
SHGetMalloc
SHGetDesktopFolder
SHGetSpecialFolderLocation
DragAcceptFiles
ShellExecuteExA
SHBrowseForFolderA
SHGetPathFromIDListA
ShellExecuteA
SHAppBarMessage
SHGetFileInfoA
Shell_NotifyIconA
Sections
.text Size: 127KB - Virtual size: 263KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 152KB - Virtual size: 151KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ