Static task
static1
Behavioral task
behavioral1
Sample
ca41b66065919b7a7fe4d7338eb8468639670188a688c80073c406f311cf46d3.exe
Resource
win7-20220901-en
General
-
Target
ca41b66065919b7a7fe4d7338eb8468639670188a688c80073c406f311cf46d3
-
Size
217KB
-
MD5
6faccd0c4db40f444cf6cdbd6e87a052
-
SHA1
e912df760b2a57ff0f3361e2b4a529ae3ba6929c
-
SHA256
ca41b66065919b7a7fe4d7338eb8468639670188a688c80073c406f311cf46d3
-
SHA512
09ffb846fd5a15c8658b933e06035483ad1ad6377e47221e18d67574bcb74ad1a591f837dd2d9c0306d37d3cd9d8d80020afc9c9c134735d8bcc5fa6b4db471b
-
SSDEEP
3072:RA4QkwFtd+WceJPrudG2mi1PVXLW9hvzOtoqzmbnwXFUSqlDjU5a6myJ:TQhcepIKLOtDm7mAF63J
Malware Config
Signatures
Files
-
ca41b66065919b7a7fe4d7338eb8468639670188a688c80073c406f311cf46d3.exe windows x86
6039c26165040db47e28057ca34786ef
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
srand
memcmp
strcat
isdigit
isspace
memcpy
rename
memset
_EH_prolog
__CxxFrameHandler
strcmp
strncpy
strstr
strcpy
rand
abs
strlen
user32
MessageBoxA
wvsprintfA
kernel32
GetModuleHandleA
HeapReAlloc
HeapFree
GetProcessHeap
HeapAlloc
LoadLibraryA
GetProcAddress
GetTickCount
GetStartupInfoA
GetCommandLineA
ExitProcess
Sections
.text Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 10KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 70KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE