Static task
static1
Behavioral task
behavioral1
Sample
d63f1563ff5d962a2d380e798c8567b432b8a8d50d0cb738806a4b3b858afa7a.exe
Resource
win7-20220901-en
General
-
Target
d63f1563ff5d962a2d380e798c8567b432b8a8d50d0cb738806a4b3b858afa7a
-
Size
55KB
-
MD5
16712b66a80901a09199c5497377d596
-
SHA1
8bb0e51dbc594df9808c69e36ab18b4569c9ab66
-
SHA256
d63f1563ff5d962a2d380e798c8567b432b8a8d50d0cb738806a4b3b858afa7a
-
SHA512
d4e73b988ac8f953f7262adf0ccb2a4b930647e93d4f6ccc575ae4692556f637a822039f4d1705da9ec3a399c592052787ce3bc9686dd85f9497bdc9438f7344
-
SSDEEP
1536:Q+zqGUhnp0LF9X4Khqf6nrI3vRJCGnww66KZplLVLPr:P4Ku6nrIvOGB6Rd
Malware Config
Signatures
Files
-
d63f1563ff5d962a2d380e798c8567b432b8a8d50d0cb738806a4b3b858afa7a.exe windows x86
738e13baacbcb2ec8e48227fec8e3e7a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memset
memcpy
_CIatan2
strncpy
strlen
kernel32
GetModuleHandleA
HeapCreate
HeapDestroy
ExitProcess
LoadLibraryA
GetProcAddress
CloseHandle
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapReAlloc
HeapAlloc
HeapFree
Sections
.code Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ