Static task
static1
Behavioral task
behavioral1
Sample
63ae02e6ba4292f7ca7b770556135e0b6919a0bfc7bee4c9396e105786db09bd.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
63ae02e6ba4292f7ca7b770556135e0b6919a0bfc7bee4c9396e105786db09bd.exe
Resource
win10v2004-20221111-en
General
-
Target
63ae02e6ba4292f7ca7b770556135e0b6919a0bfc7bee4c9396e105786db09bd
-
Size
57KB
-
MD5
627a869c8d8478901f9584150cee4480
-
SHA1
054fc823cd6b5281153347ce6722fc662f92f30c
-
SHA256
63ae02e6ba4292f7ca7b770556135e0b6919a0bfc7bee4c9396e105786db09bd
-
SHA512
b584914d8be4a3a1fc4aa676f747bbabf916592d630d598eddadf6e3e657348bb9ce8be3b18181b6e6a9ab245a90a4d9da234efd966e2dd0c3558ebf10402c80
-
SSDEEP
1536:s+vjeoOvvmXXImZvtaY/MxiU938lJaTapj3XXN:Hj8GX4mZvt+xinlJ3pj3H
Malware Config
Signatures
Files
-
63ae02e6ba4292f7ca7b770556135e0b6919a0bfc7bee4c9396e105786db09bd.exe windows x86
b2112106b568b55ddd7656333f02ab74
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
IsValidLocale
lstrcpyW
lstrlenW
GetModuleFileNameA
lstrcpyW
CreateEventA
lstrcpyW
SetLastError
GetCommState
DeleteFileA
FileTimeToLocalFileTime
GetLogicalDriveStringsW
GetMailslotInfo
GetProcessHeap
GetLocaleInfoA
GetStartupInfoA
GetConsoleAliasW
GetStdHandle
lstrcpyW
lstrcpyW
GetVolumePathNameW
VirtualAllocEx
tapi3
DllRegisterServer
DllUnregisterServer
DllGetClassObject
DllCanUnloadNow
Sections
.text Size: 4KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ORPC Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.PDATA Size: 512B - Virtual size: 292B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE