Static task
static1
Behavioral task
behavioral1
Sample
ca8e5bcc467380ee33729367c1670e686f4e69fa4dcfe14eef0d6e1576dcab77.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ca8e5bcc467380ee33729367c1670e686f4e69fa4dcfe14eef0d6e1576dcab77.exe
Resource
win10v2004-20221111-en
General
-
Target
ca8e5bcc467380ee33729367c1670e686f4e69fa4dcfe14eef0d6e1576dcab77
-
Size
24KB
-
MD5
603a90af899db49fe3c00d258c49aaad
-
SHA1
7639d50bfd9b6cb66110f468bba282597bc91e78
-
SHA256
ca8e5bcc467380ee33729367c1670e686f4e69fa4dcfe14eef0d6e1576dcab77
-
SHA512
de114657a13dcbabeb79966af1241469927407594fe0e9261068fffdda6f14903806e2cc73f83c190b3fa7406ec0cd603a50d7da8643f79f5579b84443a4b004
-
SSDEEP
384:DfDZzQnSuPXKKhksvkNTn/AXkW1RsNrH24TanaLPPPm7rTd1seznV2G2Z73Jj20x:TDZzQnSuPXKKhksv0n/9W1RirH24Taaj
Malware Config
Signatures
Files
-
ca8e5bcc467380ee33729367c1670e686f4e69fa4dcfe14eef0d6e1576dcab77.exe windows x86
4aef96abaeb222b50f299f3e320d60a4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapDestroy
lstrcpyA
HeapAlloc
GetProcAddress
SetUnhandledExceptionFilter
LeaveCriticalSection
GetCurrentProcessId
HeapFree
TerminateProcess
GetCurrentThreadId
EnterCriticalSection
GetTickCount
Sleep
VirtualAlloc
lstrcmpA
GetModuleHandleA
QueryPerformanceCounter
lstrlenA
GetCurrentProcess
HeapCreate
SetEvent
ntdll
NtCreateFile
dhcpcsvc
McastEnumerateScopes
msvcrt
malloc
_initterm
free
_adjust_fdiv
Sections
.textbss Size: - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 512B - Virtual size: 452B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 216B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE