Static task
static1
Behavioral task
behavioral1
Sample
ca3ca42b0a865ba94bedf4917eab804377c3207a186c10f6781ab50b9233eb0c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ca3ca42b0a865ba94bedf4917eab804377c3207a186c10f6781ab50b9233eb0c.exe
Resource
win10v2004-20221111-en
General
-
Target
ca3ca42b0a865ba94bedf4917eab804377c3207a186c10f6781ab50b9233eb0c
-
Size
235KB
-
MD5
be16eb488ecf46dfb4cbc1c1cc8985be
-
SHA1
4830466c73c33bbf9720ac92603109775b787f8e
-
SHA256
ca3ca42b0a865ba94bedf4917eab804377c3207a186c10f6781ab50b9233eb0c
-
SHA512
b55ebe39d1159bf0112a678bfcb94cea3947f794167e4d5c1a6d100c9b42423976d6435e6e8a9b6bea4e337ec25b725d7af5d442690c9d447ba25cc0279333b3
-
SSDEEP
6144:JepS2tvDNG2WIQZztQhRj3vqBO5jeRFchgr8WPHSVF4:Qp7xDgZoCcjeRFchp/m
Malware Config
Signatures
Files
-
ca3ca42b0a865ba94bedf4917eab804377c3207a186c10f6781ab50b9233eb0c.exe windows x86
1323c5dacf3d44a8d539b613cd841902
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RtlZeroMemory
CreateThread
lstrcpyA
SetUnhandledExceptionFilter
WaitForSingleObject
LoadLibraryA
GetProcAddress
TerminateProcess
GlobalAlloc
ExitProcess
ntdll
_wcsicmp
user32
GetMessageA
KillTimer
TranslateMessage
CreateWindowExA
ShowWindow
UpdateWindow
DispatchMessageW
comdlg32
GetOpenFileNameW
powrprof
GetActivePwrScheme
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 225KB - Virtual size: 225KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ