Static task
static1
Behavioral task
behavioral1
Sample
c63aa24e127b31d3cae88fad2d365dcd098c3d9c4e139fde0de44726565667f8.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c63aa24e127b31d3cae88fad2d365dcd098c3d9c4e139fde0de44726565667f8.exe
Resource
win10v2004-20220812-en
General
-
Target
c63aa24e127b31d3cae88fad2d365dcd098c3d9c4e139fde0de44726565667f8
-
Size
104KB
-
MD5
a13bb3334d94bad4219ff3561e7e7d60
-
SHA1
5bdd180a08ed23306d089d1b1fa5541985ad4306
-
SHA256
c63aa24e127b31d3cae88fad2d365dcd098c3d9c4e139fde0de44726565667f8
-
SHA512
636c03060862c5cee0f15e06c7c4b287ec0e9f83753bd6a3b1a47d23b98d1b0b19149e86d2dad7bd16a7f2fda126df7b6890f2d423f1da677f555fc3ad2e1198
-
SSDEEP
3072:ORK3JZopmFFoVNyhDK7UCxaP2uDkM9df/QWJqNxvyL0:OfmBK73atDk+fJHL0
Malware Config
Signatures
Files
-
c63aa24e127b31d3cae88fad2d365dcd098c3d9c4e139fde0de44726565667f8.exe windows x86
077d98326a71ab0881777a05c5bf5321
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TerminateProcess
WinExec
UnhandledExceptionFilter
GetCurrentProcess
GetStringTypeW
GetStringTypeA
HeapFree
HeapAlloc
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
GetModuleFileNameA
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
GetVersionExA
LCMapStringA
LCMapStringW
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
RtlUnwind
WriteFile
GetCPInfo
GetACP
GetOEMCP
GetProcAddress
LoadLibraryA
MultiByteToWideChar
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
Sections
.text Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE