Static task
static1
Behavioral task
behavioral1
Sample
f0e63e7ffd2a2be03ea6d31d03ff819318d19cd1491dadb64f2f6422c8a03b1d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f0e63e7ffd2a2be03ea6d31d03ff819318d19cd1491dadb64f2f6422c8a03b1d.exe
Resource
win10v2004-20220812-en
General
-
Target
f0e63e7ffd2a2be03ea6d31d03ff819318d19cd1491dadb64f2f6422c8a03b1d
-
Size
32KB
-
MD5
6de092c48cb62cfdd3929d46cc394ad3
-
SHA1
16e5bc943df9b5f1b0288d746fadb9cbec4b15d1
-
SHA256
f0e63e7ffd2a2be03ea6d31d03ff819318d19cd1491dadb64f2f6422c8a03b1d
-
SHA512
53298efbfbdf1525ac7afe945e11c979bfdb03c3351b743ce10020e61cffbe248d878297899df9e494ed05d86e1ede1f095905ca5b5fee75091793ca6d15d01a
-
SSDEEP
384:45vE8lfeBW8RpHwRZt0Id1XNqqw0RqCgsweWbEiaGJ2lG3jeiTdK4PPiKcjoID9S:45YBW8YRwYIqwRSweieE3jeh4Wk4Lw
Malware Config
Signatures
Files
-
f0e63e7ffd2a2be03ea6d31d03ff819318d19cd1491dadb64f2f6422c8a03b1d.exe windows x86
5c6b50ad4b478051e2c6eaffe7dc0f5d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memset
memmove
strncpy
_strnicmp
strncmp
_strdup
free
strlen
strcpy
strcat
memcmp
_stricmp
memcpy
kernel32
GetModuleHandleA
HeapCreate
HeapDestroy
ExitProcess
EnterCriticalSection
WaitForSingleObject
LeaveCriticalSection
InitializeCriticalSection
CloseHandle
CreateThread
HeapAlloc
HeapFree
GetCurrentThreadId
GetCurrentProcessId
GetCurrentProcess
DuplicateHandle
CreatePipe
GetStdHandle
CreateProcessA
GetEnvironmentVariableA
SetEnvironmentVariableA
CreateFileA
SetFilePointer
SetEndOfFile
WriteFile
GetFileSize
ReadFile
Sleep
GetTickCount
GetTempPathA
LoadLibraryA
GetProcAddress
FreeLibrary
SetCurrentDirectoryA
CopyFileA
GetDriveTypeA
FindFirstFileA
FindClose
GetFileAttributesA
DeleteFileA
MoveFileA
TlsGetValue
TlsSetValue
TlsAlloc
HeapReAlloc
WriteConsoleA
WaitForMultipleObjects
GetCurrentThread
CreateSemaphoreA
ReleaseSemaphore
comctl32
InitCommonControls
user32
FindWindowA
ShowWindowAsync
CharLowerA
EnableWindow
DefWindowProcA
DestroyWindow
GetWindowLongA
GetWindowTextLengthA
GetWindowTextA
UnregisterClassA
LoadCursorA
RegisterClassExA
IsWindowEnabled
GetSystemMetrics
CreateWindowExA
SetWindowLongA
SendMessageA
SetFocus
CreateAcceleratorTableA
SetForegroundWindow
BringWindowToTop
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
DestroyAcceleratorTable
MessageBoxA
GetWindowThreadProcessId
IsWindowVisible
GetForegroundWindow
EnumWindows
gdi32
GetStockObject
ole32
CoInitialize
shell32
ShellExecuteExA
winmm
timeBeginPeriod
timeEndPeriod
Sections
.code Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 152B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 660B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ