Static task
static1
Behavioral task
behavioral1
Sample
ca2c2835c3b22af124c40893c487ae5fe83b277392d70daca8d9f1ca21428aa2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ca2c2835c3b22af124c40893c487ae5fe83b277392d70daca8d9f1ca21428aa2.exe
Resource
win10v2004-20220812-en
General
-
Target
ca2c2835c3b22af124c40893c487ae5fe83b277392d70daca8d9f1ca21428aa2
-
Size
73KB
-
MD5
40102fe890a9a0acd191a461baf92dfa
-
SHA1
759953aa3e46e60740653179c5cf46db0899d264
-
SHA256
ca2c2835c3b22af124c40893c487ae5fe83b277392d70daca8d9f1ca21428aa2
-
SHA512
6426e008c1e68264e004e57449b90496a27af0249a3752a95231f33de14de9625d26574d9fde6d6e0ff6277ca561c14b2a2db6cb2b65755a209e20bc5b67a2b1
-
SSDEEP
768:NCJ6g3KXo/mr27dzq1y5ou5qaPqXqCIyBHq66XJAO0sJGaJxyLoI8p6rLPEp6aK:uKY7RLnnPbCIyBHBw6O0sJeW8rDE8R
Malware Config
Signatures
Files
-
ca2c2835c3b22af124c40893c487ae5fe83b277392d70daca8d9f1ca21428aa2.exe windows x86
32ca8d5fca836efa8536566f0eee05c5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
GetModuleHandleA
LoadLibraryA
ExitProcess
CreateThread
VirtualAlloc
VirtualFree
ExitThread
GetSystemDirectoryA
CreateFileA
WriteFile
CloseHandle
FreeLibrary
GetFileTime
CompareFileTime
GetModuleFileNameA
GetCommandLineA
Sections
BitArts Size: 30KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BitArts Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BitArts Size: - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BitArts Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BitArts Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE