Static task
static1
Behavioral task
behavioral1
Sample
63ef6dda66ef8acec8d0a007bfd19f202276757e698ec6b45db4b207ada84b32.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
63ef6dda66ef8acec8d0a007bfd19f202276757e698ec6b45db4b207ada84b32.exe
Resource
win10v2004-20220812-en
General
-
Target
63ef6dda66ef8acec8d0a007bfd19f202276757e698ec6b45db4b207ada84b32
-
Size
270KB
-
MD5
7d243f97e0703455596020dcfaf034c0
-
SHA1
a478c89d5e8333593c2b1436d80e3a72b2476f61
-
SHA256
63ef6dda66ef8acec8d0a007bfd19f202276757e698ec6b45db4b207ada84b32
-
SHA512
c939abd99236758eeab67b2be15072401e9f3c3db85e1d0fadd0436cd55de44523a69194b32f6ee2c6138949b1a36ceeffcc496e66c1a37191612c865ed7ced6
-
SSDEEP
3072:K+8NPtwqKBbTuAC+ckOKy/TWjH7HEFgpvNajSaRwa9Dhs5dCHnyT3IfTI:K+APeD/umjOKQTWjbHEaa2vMNiGnyEf
Malware Config
Signatures
Files
-
63ef6dda66ef8acec8d0a007bfd19f202276757e698ec6b45db4b207ada84b32.exe windows x86
3649536a72c85170ff3599fed6dbcbea
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStartupInfoA
GetProcAddress
LoadLibraryExA
BackupRead
BackupSeek
BackupWrite
CloseHandle
CompareStringW
CreateDirectoryW
CreateEventW
CreateHardLinkW
CreateMutexW
CreateProcessW
CreateSemaphoreW
CreateThread
DeleteCriticalSection
DeleteFileW
DeviceIoControl
EnterCriticalSection
EraseTape
ExitThread
ExpandEnvironmentStringsW
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
FindFirstFileW
FindFirstVolumeMountPointW
FindNextFileW
FindNextVolumeMountPointW
FindResourceW
FindVolumeMountPointClose
FlushFileBuffers
FormatMessageW
FreeLibrary
GetCompressedFileSizeW
GetComputerNameW
GetCurrentDirectoryA
GetCurrentDirectoryW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDateFormatW
GetDiskFreeSpaceExW
GetDriveTypeW
GetEnvironmentVariableW
GetExitCodeThread
GetFileAttributesW
GetFileInformationByHandle
GetFileSize
GetLastError
GetLocalTime
GetLocaleInfoW
GetLogicalDriveStringsW
GetModuleFileNameW
GetModuleHandleA
GetNumberFormatW
GetPrivateProfileStringW
GetProcessHeap
GetStartupInfoW
GetACP
GetSystemTime
GetSystemTimeAsFileTime
GetTapeParameters
GetTapePosition
GetTapeStatus
GetTickCount
GetTimeFormatW
GetTimeZoneInformation
GetUserDefaultLCID
GetVersionExW
GetVolumeInformationW
GetVolumeNameForVolumeMountPointW
GetVolumePathNameW
GetWindowsDirectoryW
GlobalFree
HeapAlloc
HeapFree
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
LoadLibraryW
LoadResource
LocalFileTimeToFileTime
LocalFree
LockFile
LockResource
MoveFileExW
MultiByteToWideChar
PrepareTape
QueryPerformanceCounter
ReadFile
ReleaseMutex
ReleaseSemaphore
RemoveDirectoryW
SetCurrentDirectoryW
SetEndOfFile
SetErrorMode
SetEvent
SetFileAttributesW
SetFilePointer
SetFileShortNameW
SetFileTime
SetLastError
SetTapeParameters
SetTapePosition
SetUnhandledExceptionFilter
Sleep
SystemTimeToFileTime
SystemTimeToTzSpecificLocalTime
TerminateProcess
TerminateThread
UnhandledExceptionFilter
VerSetConditionMask
VerifyVersionInfoW
WaitForSingleObject
WideCharToMultiByte
WriteFile
WritePrivateProfileStringW
WriteTapemark
GetSystemDirectoryW
CreateFileW
user32
LoadCursorW
LoadIconA
LoadIconW
advapi32
RegOpenKeyA
Sections
.text Size: 168KB - Virtual size: 167KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text1 Size: 512B - Virtual size: 100B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata2 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 54KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ