Static task
static1
Behavioral task
behavioral1
Sample
c89ce9d31d3787924fdcd8f4ff75a9b8858bf8ce3094b8897c681377ecd0e76f.exe
Resource
win7-20220901-en
General
-
Target
c89ce9d31d3787924fdcd8f4ff75a9b8858bf8ce3094b8897c681377ecd0e76f
-
Size
315KB
-
MD5
fd8a578a4aa1416332dc40d88f12d3ff
-
SHA1
546db1e24af17b2d0a880b11cc87b703586c38c6
-
SHA256
c89ce9d31d3787924fdcd8f4ff75a9b8858bf8ce3094b8897c681377ecd0e76f
-
SHA512
d8419ba367750622eabed27202dcde7013771c56d9545aee3944a8c13d3d0cec95abc9b6298dea43983d3f6c3b204c08c2401ab5a4a05f61256d2a56c4a15381
-
SSDEEP
6144:cDXxN7UZjTATfwqK+ejy2JMnBReB/oOVbu5AkrhajCZcpR9GT7jCcb0sk8PJ:UxNAFTArwqKy2JMDuoOwgTp3G+Yd
Malware Config
Signatures
Files
-
c89ce9d31d3787924fdcd8f4ff75a9b8858bf8ce3094b8897c681377ecd0e76f.exe windows x86
65c42d2f3cbe83d61386ec9266189707
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateProcessA
ExitProcess
FindResourceA
GetModuleFileNameA
GetThreadContext
GetTickCount
LoadResource
LockResource
ReadProcessMemory
ResumeThread
SetThreadContext
SizeofResource
VirtualAlloc
VirtualAllocEx
VirtualFree
WriteProcessMemory
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 472B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1004B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ccccc Size: 311KB - Virtual size: 311KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ