Static task
static1
Behavioral task
behavioral1
Sample
ca920a6c3a2fa2078d19e72e99e63d8f751d20652c88656cc8461e1cad8d556d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ca920a6c3a2fa2078d19e72e99e63d8f751d20652c88656cc8461e1cad8d556d.exe
Resource
win10v2004-20220901-en
General
-
Target
ca920a6c3a2fa2078d19e72e99e63d8f751d20652c88656cc8461e1cad8d556d
-
Size
128KB
-
MD5
0e8143d9934e6b7f5400275fdbe11dbc
-
SHA1
a50a34db121f0459a3e1f6db440aa6f363b3f0e1
-
SHA256
ca920a6c3a2fa2078d19e72e99e63d8f751d20652c88656cc8461e1cad8d556d
-
SHA512
1ede32354636549d8cb996982c3bb9015bb50cd23c17daa3ce8076701698bf39ec562398faa415c5c1f62914dd15eab7604f19d6b7da304cc7cd9dd7f9ea11df
-
SSDEEP
3072:U40PwZVhjl3rN5TwCDlfD0n8ttw34X3L+juZ1r:U4myrvTwCZfDBnL+juf
Malware Config
Signatures
Files
-
ca920a6c3a2fa2078d19e72e99e63d8f751d20652c88656cc8461e1cad8d556d.exe windows x86
f9af69c45250c5ee39428cd11edf167f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateMutexA
GetCurrentProcessId
LocalAlloc
GetProcAddress
LoadLibraryA
GetSystemDirectoryA
GetStdHandle
VirtualProtect
LocalFree
ExitProcess
GetCurrentThread
VirtualAlloc
GetCurrentThreadId
CreateEventA
SetEvent
GetFileSize
user32
GetActiveWindow
GetSystemMetrics
msvcrt
memset
wcslen
wcsncpy
memcpy
Sections
.text Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 14B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 71KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ