Static task
static1
Behavioral task
behavioral1
Sample
asInvoker.exe
Resource
win10v2004-20230220-en
General
-
Target
Malware.zip
-
Size
109.3MB
-
MD5
e2fe667be99914dceae6155dcfed1559
-
SHA1
1a092fdf49ebd093ace4ee7512062c5e8e3c1171
-
SHA256
065e3016db7a5cd3da79c7cabfb1272b0672f70d5d55b16de1d7fd8f8710e539
-
SHA512
ec65829b7f6eec94960c17b69b141e53a6206fc3423ba80d39317d41004445894a5000fd9be5402d98b64e762761fc12fe4fd84be07f80dbbfee50113c8b9210
-
SSDEEP
3145728:CRdXU/Y0yRGI+lfqXbSQnmnKZ2CGFNNIh2FxX:gdXN0yRGNiXbZynCGFNNIq
Malware Config
Signatures
Files
-
Malware.zip.zip
Password: infected
-
asInvoker.exe.exe windows x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
mscoree
_CorExeMain
Sections
.text Size: 109.3MB - Virtual size: 109.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ