Static task
static1
Behavioral task
behavioral1
Sample
61d63cc8e9b1867f75d0454dd07d8ae90007eb59623b73fc8a2871f72de8d2fd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
61d63cc8e9b1867f75d0454dd07d8ae90007eb59623b73fc8a2871f72de8d2fd.exe
Resource
win10v2004-20220901-en
General
-
Target
61d63cc8e9b1867f75d0454dd07d8ae90007eb59623b73fc8a2871f72de8d2fd
-
Size
205KB
-
MD5
0c3c3b3b4059f4f4cc4b6de546cb9932
-
SHA1
b42ccc75db309744ffef128715a1848648084183
-
SHA256
61d63cc8e9b1867f75d0454dd07d8ae90007eb59623b73fc8a2871f72de8d2fd
-
SHA512
b3db04238647bd9488ac70d5173e105aed506c5f88f55f7f36c016a22d7a9c4261239047dd75764bcb5b5ed1451798e8a49246dfc3667fc27c3906be744d025a
-
SSDEEP
1536:MlVYWzSk0YxgYXrssDLRjbP8Tg54erD8u4NZWoU8/aMKM5BbbQnVtAcAaCRj1:EVYtYaYIsfiNerD8TtV7ngVe9r
Malware Config
Signatures
Files
-
61d63cc8e9b1867f75d0454dd07d8ae90007eb59623b73fc8a2871f72de8d2fd.exe windows x86
86d3829a097d9d92b856bbadd12ec7a3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetACP
GetStartupInfoW
IsDBCSLeadByte
LCMapStringW
GetSystemTimeAsFileTime
GetModuleHandleW
GetModuleFileNameW
GetTempPathW
GetTempFileNameA
GetStringTypeA
CreateFileMappingA
GetThreadLocale
GetTempPathA
GetVersionExW
GetFileAttributesA
WideCharToMultiByte
RaiseException
VirtualProtect
SetStdHandle
GetLocaleInfoW
GetProcAddress
CreateProcessA
msvcrt
_exit
calloc
_except_handler3
_controlfp
_XcptFilter
__getmainargs
__p___initenv
__p__fmode
atan2
free
_initterm
__p__commode
_adjust_fdiv
__set_app_type
Sections
.text Size: 1024B - Virtual size: 562B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 97KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 86KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE