File name: | c36ca3dd5bf2d289c35d8aba7763b25ae579186a030d4dce09b99eca7744956c |
Full analysis: | https://app.any.run/tasks/3b474f08-b0d5-4251-ba26-576fd34274e3 |
Verdict: | Malicious activity |
Analysis date: | December 05, 2022, 20:39:44 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Indicators: | |
MIME: | application/x-dosexec |
File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
MD5: | 4C7F40CA0B11F11FEB0DF97081BCF0D5 |
SHA1: | 0B2541E4F6AFF057ED2904DD48DEE1734A4D87A3 |
SHA256: | C36CA3DD5BF2D289C35D8ABA7763B25AE579186A030D4DCE09B99ECA7744956C |
SSDEEP: | 768:+PGzQPi/qtWFvJXjhPzYjfxPkpw2dI8Cs:+ekPi/qtYjhP8jmwAr |
.exe | | | Win64 Executable (generic) (61.6) |
---|---|---|
.dll | | | Win32 Dynamic Link Library (generic) (14.6) |
.exe | | | Win32 Executable (generic) (10) |
.exe | | | Win16/32 Executable Delphi generic (4.6) |
.exe | | | Generic Win/DOS Executable (4.4) |
Architecture: | IMAGE_FILE_MACHINE_I386 |
---|---|
Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Compilation Date: | 2002-Aug-30 14:18:48 |
e_magic: | MZ |
---|---|
e_cblp: | 144 |
e_cp: | 3 |
e_crlc: | - |
e_cparhdr: | 4 |
e_minalloc: | - |
e_maxalloc: | 65535 |
e_ss: | - |
e_sp: | 184 |
e_csum: | - |
e_ip: | - |
e_cs: | - |
e_ovno: | - |
e_oemid: | - |
e_oeminfo: | - |
e_lfanew: | 128 |
Signature: | PE |
---|---|
Machine: | IMAGE_FILE_MACHINE_I386 |
NumberofSections: | 4 |
TimeDateStamp: | 2002-Aug-30 14:18:48 |
PointerToSymbolTable: | - |
NumberOfSymbols: | - |
SizeOfOptionalHeader: | 224 |
Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
---|---|---|---|---|---|
.text | 4096 | 13032 | 13032 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 7.07242 |
.bss | 20480 | 3380 | 0 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | |
.data | 24576 | 7072 | 7072 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 5.96987 |
.idata | 32768 | 4012 | 4012 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 5.47423 |
ADVAPI32.DLL |
CRTDLL.DLL |
KERNEL32.DLL |
USER32.DLL |
wsock32.dll |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1968 | "C:\Users\admin\AppData\Local\Temp\c36ca3dd5bf2d289c35d8aba7763b25ae579186a030d4dce09b99eca7744956c.exe" | C:\Users\admin\AppData\Local\Temp\c36ca3dd5bf2d289c35d8aba7763b25ae579186a030d4dce09b99eca7744956c.exe | Explorer.EXE | ||||||||||||
User: admin Integrity Level: MEDIUM Modules
|