Static task
static1
Behavioral task
behavioral1
Sample
ca3d2fa1932c4c2c4e6503362518a5e514256b159059128b9e81291e4c28fea9.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ca3d2fa1932c4c2c4e6503362518a5e514256b159059128b9e81291e4c28fea9.exe
Resource
win10v2004-20220812-en
General
-
Target
ca3d2fa1932c4c2c4e6503362518a5e514256b159059128b9e81291e4c28fea9
-
Size
150KB
-
MD5
99864e7936047fb3cbee2ec12297cc3f
-
SHA1
e23d2eff26277ee54f08772be9e341627cb65d93
-
SHA256
ca3d2fa1932c4c2c4e6503362518a5e514256b159059128b9e81291e4c28fea9
-
SHA512
78a789b285a27b6af023c32a7b31c702d4443265838821364f84f870c4151c22166ee47cbbeb458541194ba51d96d5b4d30cb965f5e42ffd7347accdc2fb0274
-
SSDEEP
3072:EndN1NucD3haGzmaYtvQQ3PwrWHRQZhZydGy8N1Wl0KVZ:EdlX3hsDvVPwkLdBgK
Malware Config
Signatures
Files
-
ca3d2fa1932c4c2c4e6503362518a5e514256b159059128b9e81291e4c28fea9.exe windows x86
bf583220eb26eddb8f7a18f34776ac88
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetACP
ResumeThread
RtlUnwind
CreateFileA
ReadConsoleA
GetFileAttributesA
WriteFile
WaitForSingleObject
GetCurrentProcess
GetCurrentDirectoryA
LocalFileTimeToFileTime
TlsSetValue
GetFileAttributesW
GetLastError
GetLocalTime
SetConsoleCtrlHandler
RemoveDirectoryA
Beep
GetFullPathNameA
RaiseException
VirtualFree
PeekConsoleInputA
GetVersion
TlsGetValue
LoadLibraryW
GetCurrentDirectoryW
GetModuleFileNameA
IsBadWritePtr
FindNextFileA
SetStdHandle
GetStartupInfoA
FreeLibrary
SystemTimeToFileTime
IsValidCodePage
CreateFileW
FlushFileBuffers
SetLocalTime
GetCommandLineA
FindFirstFileA
SetFileAttributesA
FindFirstFileW
FileTimeToSystemTime
GetFileInformationByHandle
SetFilePointer
CloseHandle
GetSystemDefaultLCID
SetUnhandledExceptionFilter
UnlockFile
MultiByteToWideChar
SetFileTime
SetEndOfFile
DeleteCriticalSection
FileTimeToLocalFileTime
SetFileAttributesW
LockFile
FindNextFileW
CreateThread
GetNumberOfConsoleInputEvents
GetConsoleMode
CreatePipe
DeleteFileA
IsBadCodePtr
GetLogicalDrives
GetFileType
ReadFile
GetStdHandle
FindClose
GetModuleHandleA
TlsAlloc
GetSystemDefaultLangID
QueryPerformanceCounter
DuplicateHandle
SetCurrentDirectoryW
InitializeCriticalSection
GetDiskFreeSpaceA
GetModuleFileNameW
RemoveDirectoryW
LeaveCriticalSection
GetCPInfo
EnterCriticalSection
GetFullPathNameW
CreateDirectoryA
GetEnvironmentStrings
WriteConsoleA
GetCurrentThread
GetDriveTypeW
GetProcAddress
GetUserDefaultLCID
GetTimeZoneInformation
SetEnvironmentVariableW
ReadConsoleInputA
SetEnvironmentVariableA
GetDriveTypeA
CreateDirectoryW
SetCurrentDirectoryA
SetConsoleMode
GetExitCodeProcess
user32
MessageBoxA
Sections
.text Size: 86KB - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ