Static task
static1
Behavioral task
behavioral1
Sample
ca72d47f1eb110baf8ed24ad27ac79b921e6c39ce4bfc47169aeea88cdf09ae5.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ca72d47f1eb110baf8ed24ad27ac79b921e6c39ce4bfc47169aeea88cdf09ae5.exe
Resource
win10v2004-20221111-en
General
-
Target
ca72d47f1eb110baf8ed24ad27ac79b921e6c39ce4bfc47169aeea88cdf09ae5
-
Size
404KB
-
MD5
65a945b7f6feb72dff8f60c2800d13bb
-
SHA1
9e7ac77c6ea5b400e7fa0acc4a3e887377458d99
-
SHA256
ca72d47f1eb110baf8ed24ad27ac79b921e6c39ce4bfc47169aeea88cdf09ae5
-
SHA512
be069ebccc134fdc81b64c957229a1396e2a10e59c83ee646ac928c2764c15f3d8e706caa16b3276c5a27c9caeae6244f00c15b66d39ab12b08a8e2f8b1c909d
-
SSDEEP
6144:n6RB5Z2Ojw6xXP0rOP23+0QdpPpiF+hkRHVf53q0Rxbfptkouj9D5:IqSwa7QSZpk+hkM0R5/kou5D5
Malware Config
Signatures
Files
-
ca72d47f1eb110baf8ed24ad27ac79b921e6c39ce4bfc47169aeea88cdf09ae5.exe windows x86
009db8af3ec708d323db012155258f57
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
GetProcAddress
VirtualAlloc
GetModuleHandleA
SetEvent
GetStringTypeA
LCMapStringW
LCMapStringA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
HeapFree
RtlUnwind
WriteFile
GetCPInfo
GetACP
GetOEMCP
HeapAlloc
HeapReAlloc
LoadLibraryA
MultiByteToWideChar
GetStringTypeW
user32
LoadIconA
LoadBitmapA
Sections
.text Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 332KB - Virtual size: 724KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ