Static task
static1
Behavioral task
behavioral1
Sample
c63879c8c49154c89193df121e612d71855a27d8ebbf8d78f29100581200354a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c63879c8c49154c89193df121e612d71855a27d8ebbf8d78f29100581200354a.exe
Resource
win10v2004-20220812-en
General
-
Target
c63879c8c49154c89193df121e612d71855a27d8ebbf8d78f29100581200354a
-
Size
305KB
-
MD5
14d3376b75fae7268e88e9d2a2f69baf
-
SHA1
ce15bb73d1c6b98d1d99ab630ddd80135320101e
-
SHA256
c63879c8c49154c89193df121e612d71855a27d8ebbf8d78f29100581200354a
-
SHA512
c9c43374acdecf61ef7a1b74207a82b9661cdf34c56e815350de2082a49189ac7e7be8450181accdde660bfbf918f3252cab23f67ff3d61ee787bbf7d68c7005
-
SSDEEP
6144:AVUuVuZccJRSFzNliMFM33e0X3lZsU8AlCYmJGxqFagOTgh:eUuVq9JRSFaMF23e0X3YU8AKDFRQ
Malware Config
Signatures
Files
-
c63879c8c49154c89193df121e612d71855a27d8ebbf8d78f29100581200354a.exe windows x86
e3157eccf6d647ab837ac516249cb43b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcessId
CreateEventW
InitializeCriticalSection
LoadLibraryW
ReleaseMutex
GlobalFlags
GetCurrentThreadId
WriteFile
GetEnvironmentVariableW
lstrlenW
ReleaseMutex
HeapCreate
TlsGetValue
LocalFree
FindAtomA
GetFileTime
GetDriveTypeA
GetPrivateProfileStringA
FindClose
IsBadStringPtrW
user32
DispatchMessageA
GetSysColor
GetKeyboardType
GetSysColor
GetClientRect
CreateWindowExA
EndDialog
CallWindowProcW
SetFocus
IsWindow
DrawStateW
GetClassInfoA
DrawTextA
rastapi
DeviceDone
DeviceDone
DeviceDone
DeviceDone
DeviceDone
cryptui
LocalEnroll
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 352KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 295KB - Virtual size: 294KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ