Static task
static1
Behavioral task
behavioral1
Sample
63d9c98fd9de05e06dc557fc0719b2bbfa85489010f23070b044514639fb9999.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
63d9c98fd9de05e06dc557fc0719b2bbfa85489010f23070b044514639fb9999.exe
Resource
win10v2004-20220812-en
General
-
Target
63d9c98fd9de05e06dc557fc0719b2bbfa85489010f23070b044514639fb9999
-
Size
796KB
-
MD5
04053a51f45f14bfd08830b556a1a160
-
SHA1
ea41c652bbd1f4ce623aa1191f398e1efbdc2a32
-
SHA256
63d9c98fd9de05e06dc557fc0719b2bbfa85489010f23070b044514639fb9999
-
SHA512
5b825f72a27ecf6a631c838bdda470c6b22d31173eaad1b25394d5d57b6234188adfd18b39a4a3bc9e653875a5bbe62375a39268a579e708d1bde3c8d96dd4d0
-
SSDEEP
24576:8Svxeaoy1+aDsBtBEwlFDPxBnvZTr9PVNbl:5c++a9KD/ZTr9Pvbl
Malware Config
Signatures
Files
-
63d9c98fd9de05e06dc557fc0719b2bbfa85489010f23070b044514639fb9999.exe windows x86
59d275a1b60368ee3e54ed56530f8078
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetEvent
WriteFile
InitializeCriticalSection
CreateEventA
ReadFile
ResetEvent
DeleteCriticalSection
SetLastError
GetVersion
GetFileType
GetStdHandle
GetTickCount
QueryPerformanceCounter
GlobalMemoryStatus
LoadLibraryA
InterlockedCompareExchange
FlushConsoleInputBuffer
GetFileAttributesA
SetFileAttributesA
GetProcessHeap
SetEndOfFile
CreateFileW
CompareStringW
CompareStringA
GetLocalTime
WaitForSingleObject
SetFilePointer
GetFileSize
CreateFileA
GetCurrentProcessId
WaitForMultipleObjects
LeaveCriticalSection
GetModuleFileNameW
CreateProcessW
EnterCriticalSection
GetVersionExA
GetStringTypeW
MultiByteToWideChar
WideCharToMultiByte
CloseHandle
GetStringTypeA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
LCMapStringW
LCMapStringA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetTimeZoneInformation
RaiseException
SetStdHandle
GetFullPathNameA
InitializeCriticalSectionAndSpinCount
RtlUnwind
HeapSize
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
FlushFileBuffers
DeleteFileA
GetConsoleCP
OutputDebugStringA
GetCurrentThreadId
GetModuleHandleA
GetModuleFileNameA
SetConsoleCtrlHandler
GetProcAddress
GetLastError
CreateProcessA
Sleep
LoadLibraryW
SetUnhandledExceptionFilter
FreeLibrary
GetLocaleInfoA
CreateMutexW
HeapFree
HeapAlloc
ExitThread
ResumeThread
CreateThread
GetModuleHandleW
ExitProcess
CreateDirectoryA
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileA
UnhandledExceptionFilter
FindNextFileA
SetEnvironmentVariableA
GetCurrentDirectoryA
SetCurrentDirectoryA
HeapReAlloc
GetCommandLineA
GetSystemTimeAsFileTime
ReadConsoleInputA
SetConsoleMode
GetConsoleMode
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
HeapCreate
VirtualFree
VirtualAlloc
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
InterlockedDecrement
SetHandleCount
GetStartupInfoA
user32
LoadIconA
PostMessageW
GetMessageA
FindWindowW
GetProcessWindowStation
GetDesktopWindow
MessageBoxA
CreateWindowExW
DefWindowProcA
GetUserObjectInformationW
LoadCursorA
RegisterClassW
shlwapi
SHGetValueW
advapi32
DeregisterEventSource
RegisterEventSourceA
ReportEventA
shell32
SHGetFolderPathA
ws2_32
gethostbyname
accept
setsockopt
listen
send
closesocket
WSACreateEvent
socket
bind
recv
WSACleanup
shutdown
WSAEventSelect
htons
WSAEnumNetworkEvents
WSAGetLastError
htonl
WSAStartup
connect
adbwinapi
ord2
ord4
ord10
ord8
ord21
ord6
ord16
ord22
ord11
ord15
ord1
ord7
ord25
Sections
.text Size: 526KB - Virtual size: 526KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 173KB - Virtual size: 173KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 10KB - Virtual size: 133KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 77KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE