Static task
static1
Behavioral task
behavioral1
Sample
c63ef9753533e0b7aa9f2e608c12fd5a6628868844f695968c546e38b40749c6.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c63ef9753533e0b7aa9f2e608c12fd5a6628868844f695968c546e38b40749c6.exe
Resource
win10v2004-20220901-en
General
-
Target
c63ef9753533e0b7aa9f2e608c12fd5a6628868844f695968c546e38b40749c6
-
Size
160KB
-
MD5
b31c3baeda6f6f00c6551c6a2779c19c
-
SHA1
7e590ef1d4ae04dc21df6ae40040ba130e4ce602
-
SHA256
c63ef9753533e0b7aa9f2e608c12fd5a6628868844f695968c546e38b40749c6
-
SHA512
f916a844bd0ecf2d62ca5b65d5b293c066579df9d9d2e51431a83790ffbf511d132edd202f74d652f03f6240ca1f2a1b333a9932876901835d8b54058a2cb69f
-
SSDEEP
3072:H03Lz6ips8e4gXIHWrg6qXg4GbdBUPdzbQRW/B3DvuoUd0/hAWF93t:U3LWiW7zBqYabQc5DGVChAU
Malware Config
Signatures
Files
-
c63ef9753533e0b7aa9f2e608c12fd5a6628868844f695968c546e38b40749c6.exe windows x86
f9ee3557a3bcd54d31317e3f891d488e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
EnableWindow
DrawFrameControl
GetScrollRange
GetDC
CharLowerA
GetSysColor
GetClipboardData
DefFrameProcA
EnumChildWindows
BeginPaint
GetClientRect
IsWindowEnabled
CheckMenuItem
DefMDIChildProcA
SetCursor
CreateIcon
GetScrollInfo
CreatePopupMenu
DefWindowProcA
MessageBoxA
GetSysColorBrush
GetMenuItemInfoA
DrawEdge
IsDialogMessageA
GetFocus
SetWindowPos
CreateMenu
FrameRect
GetMenuItemID
GetCursorPos
GetDCEx
CreateWindowExA
GetCursor
GetMessagePos
SetWindowLongA
TrackPopupMenu
IsWindowVisible
GetWindow
CallNextHookEx
msvcrt
strncmp
tan
malloc
calloc
memmove
advapi32
RegEnumKeyExA
RegEnumValueA
RegEnumKeyA
RegQueryValueA
comdlg32
GetSaveFileNameA
version
GetFileVersionInfoA
VerInstallFileA
VerQueryValueA
oleaut32
SysFreeString
VariantChangeType
SafeArrayGetUBound
SafeArrayCreate
GetErrorInfo
OleLoadPicture
RegisterTypeLib
SafeArrayGetElement
kernel32
RaiseException
GetModuleHandleA
WideCharToMultiByte
GetModuleFileNameA
LocalAlloc
WriteFile
GetVersion
GetProcAddress
FindResourceA
GetFullPathNameA
ExitProcess
LoadLibraryA
VirtualAllocEx
HeapAlloc
GetDateFormatA
GetProcessHeap
HeapFree
SetErrorMode
LocalFree
GetCurrentThreadId
SetEndOfFile
GetCurrentThread
GlobalAlloc
FindClose
GetLocalTime
MulDiv
FindFirstFileA
Sleep
GetThreadLocale
MoveFileA
GetDiskFreeSpaceA
GetCurrentProcess
GetSystemDefaultLangID
lstrlenA
DeleteCriticalSection
GetTickCount
CreateFileA
LoadLibraryExA
SetLastError
WaitForSingleObject
DeleteFileA
VirtualQuery
FormatMessageA
VirtualAlloc
lstrcatA
GetFileSize
CreateThread
ExitThread
EnterCriticalSection
GlobalFindAtomA
VirtualFree
LockResource
GetStringTypeW
GetFileAttributesA
SetHandleCount
ResetEvent
FreeLibrary
HeapDestroy
LocalReAlloc
GetVersionExA
GetCommandLineA
GetFileType
InitializeCriticalSection
GlobalAddAtomA
Sections
.text Size: 46KB - Virtual size: 45KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 512B - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
BSS Size: 112KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE