Static task
static1
Behavioral task
behavioral1
Sample
c72ae07caf5084fa7e05b53121a14507fe931ab851e86617a34947696e4e97ad.exe
Resource
win7-20220812-en
General
-
Target
c72ae07caf5084fa7e05b53121a14507fe931ab851e86617a34947696e4e97ad
-
Size
288KB
-
MD5
dfb43345f6b51d8013240d79769b8510
-
SHA1
b1c33b1108d82bf8452cc0813ae99cf0f8d527f6
-
SHA256
c72ae07caf5084fa7e05b53121a14507fe931ab851e86617a34947696e4e97ad
-
SHA512
4149a9ea20367fe79a61c6c41ef6546c3d0269e65c1ba076ab141f4c102e9eb6354127c37543e38506f3f26a6473379ec6f69eb8b1c3e1a153326c52ed54d258
-
SSDEEP
6144:+rvOSLupTluiwGErbhzD8OHUJoc6cb9/XkFZgMSPh:+aSETluiw3rbhzIhJL/SSZ
Malware Config
Signatures
Files
-
c72ae07caf5084fa7e05b53121a14507fe931ab851e86617a34947696e4e97ad.exe windows x86
0cb3f3f6e644c4859931ef558929ab15
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
_acmdln
__set_app_type
_except_handler3
_controlfp
__dllonexit
_onexit
exit
_XcptFilter
_exit
memmove
fclose
fseek
ftell
fread
fopen
malloc
??2@YAPAXI@Z
__p__fmode
??3@YAXPAX@Z
memcpy
memset
kernel32
VirtualProtect
VirtualAlloc
IsBadReadPtr
CreateThread
GetModuleHandleA
LoadLibraryA
GetProcAddress
FindResourceExA
WaitForSingleObject
GetCurrentProcess
ExitProcess
GetStartupInfoA
Sections
.text Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 277KB - Virtual size: 277KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 744B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 304KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ