Static task
static1
Behavioral task
behavioral1
Sample
63a832f00dceed9fff58fe2158b58fefe8d9e0a69c07d94600fcc3ddf6185bc2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
63a832f00dceed9fff58fe2158b58fefe8d9e0a69c07d94600fcc3ddf6185bc2.exe
Resource
win10v2004-20220901-en
General
-
Target
63a832f00dceed9fff58fe2158b58fefe8d9e0a69c07d94600fcc3ddf6185bc2
-
Size
284KB
-
MD5
1dc726497ee251f527a3cd4693dbd2f2
-
SHA1
f42ea1386e7fbf73495756d30341249a461225d7
-
SHA256
63a832f00dceed9fff58fe2158b58fefe8d9e0a69c07d94600fcc3ddf6185bc2
-
SHA512
71f403f8c1ef801e181155921657564a0ac8bf87a675dfc0fa1884c7c0e4ad8e9710b108bc31cecca54d7ac51d1b45714b9d175e919b300a8884eb21f2b6e00c
-
SSDEEP
6144:Zwv1Lu7KaK6h877TzJBwLyQWJhv7ANOuEUgKYAhmtsCuzr8y:Zm1sKl6h8nJBwWJx7EOuu4ysDP8y
Malware Config
Signatures
Files
-
63a832f00dceed9fff58fe2158b58fefe8d9e0a69c07d94600fcc3ddf6185bc2.exe windows x86
7873997d304732364fb461ff37f0c776
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
LoadStringA
wsprintfA
MessageBoxA
kernel32
InitializeCriticalSection
LocalAlloc
LocalFree
LeaveCriticalSection
IsBadWritePtr
DisableThreadLibraryCalls
GetProcAddress
EnterCriticalSection
lstrcpynA
lstrlenA
ExpandEnvironmentStringsA
lstrcpyA
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
SetHandleCount
LoadLibraryA
GetFileType
GetStartupInfoA
GetStdHandle
HeapCreate
VirtualFree
GetModuleFileNameA
GetCPInfo
GetACP
GetOEMCP
FreeEnvironmentStringsA
MultiByteToWideChar
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
WideCharToMultiByte
WriteFile
HeapAlloc
HeapFree
VirtualAlloc
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
HeapDestroy
advapi32
RegEnumKeyExA
RegQueryValueExA
RegSetValueExA
RegOpenKeyExA
RegCloseKey
RegEnumValueA
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.0e3c Size: 512B - Virtual size: 218B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.1oqp Size: 512B - Virtual size: 208B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.15as Size: 512B - Virtual size: 208B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.a9as Size: 512B - Virtual size: 206B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.klkl Size: 512B - Virtual size: 206B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.psi Size: 512B - Virtual size: 200B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.teta Size: 512B - Virtual size: 206B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ks1 Size: 512B - Virtual size: 206B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.1231 Size: 512B - Virtual size: 206B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.1237 Size: 512B - Virtual size: 208B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.zetaa Size: 353KB - Virtual size: 352KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.zeta0 Size: 512B - Virtual size: 206B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tetaX Size: 512B - Virtual size: 206B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.1324 Size: 512B - Virtual size: 206B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.1724 Size: 512B - Virtual size: 206B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.9182 Size: 512B - Virtual size: 70B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.9381 Size: 512B - Virtual size: 158B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 260B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ