Static task
static1
Behavioral task
behavioral1
Sample
ca20a5ac024726e80dcd3263f1f58141c620b583320e31545d8dc7f612795729.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ca20a5ac024726e80dcd3263f1f58141c620b583320e31545d8dc7f612795729.exe
Resource
win10v2004-20220812-en
General
-
Target
ca20a5ac024726e80dcd3263f1f58141c620b583320e31545d8dc7f612795729
-
Size
54KB
-
MD5
28a887a4c8c58129dbe52a5a2a2204b0
-
SHA1
c60a41b96be5e6a6afc848da11b9eb471a9cf42d
-
SHA256
ca20a5ac024726e80dcd3263f1f58141c620b583320e31545d8dc7f612795729
-
SHA512
ed4d02a75a957a8d8c3b14752e251441a471e55293f22bcadd7f1583493bda1fea3e9ac64b29ef66e07156d30eee441a95e952e2644c91f3d471fd69e0b13194
-
SSDEEP
768:S97MFkYd6gmAlB/GBDbw9tqzsoj7xN5eiSajUnkiRhUr1DXc/o9GmL1dfzPwNJ2+:SekYdK8BifEtqzsoHSajylUregFgAho
Malware Config
Signatures
Files
-
ca20a5ac024726e80dcd3263f1f58141c620b583320e31545d8dc7f612795729.exe windows x86
7139f154c0e9ae29fd99be38e3487294
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetOEMCP
OpenProcess
lstrcpynA
RtlMoveMemory
Sleep
MoveFileExA
GetTempPathA
GetShortPathNameA
WinExec
SetProcessWorkingSetSize
WaitForSingleObject
GetProcessId
GetTempFileNameA
GetBinaryTypeA
CloseHandle
CreateToolhelp32Snapshot
Process32First
Process32Next
GetModuleHandleA
ExitProcess
HeapReAlloc
HeapFree
IsBadReadPtr
GetTickCount
FreeLibrary
GetProcAddress
LoadLibraryA
LCMapStringA
ReadFile
SetFilePointer
GetFileSize
CreateFileA
RtlFillMemory
HeapAlloc
GetProcessHeap
GetModuleFileNameA
IsDebuggerPresent
DeleteFileA
OpenMutexA
lstrlen
CreateMutexA
CreateProcessA
shlwapi
PathRemoveFileSpecA
PathFileExistsA
PathFindFileNameA
advapi32
RegOpenKeyA
RegCloseKey
RegQueryValueExA
CryptGetHashParam
CryptDestroyHash
CryptHashData
CryptReleaseContext
CryptCreateHash
CryptAcquireContextA
RegSetValueExA
RegDeleteKeyA
RegDeleteValueA
RegCreateKeyA
user32
GetAncestor
wvsprintfA
EnumChildWindows
GetWindowTextA
WaitForInputIdle
EnumWindows
FindWindowA
PostMessageA
wsprintfA
MessageBoxA
GetWindowThreadProcessId
ShowWindow
psapi
GetModuleFileNameExA
EnumProcesses
iphlpapi
GetAdaptersInfo
wininet
InternetOpenUrlA
InternetReadFile
InternetOpenA
InternetCloseHandle
urlmon
URLDownloadToFileA
shell32
SHFileOperationA
ShellExecuteEx
SHGetSpecialFolderPathA
msvcrt
_strnicmp
sprintf
tolower
srand
malloc
free
memmove
modf
strchr
_ftol
atoi
_CIfmod
??3@YAXPAX@Z
strncmp
strncpy
rand
Sections
.text Size: 46KB - Virtual size: 45KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE