Static task
static1
Behavioral task
behavioral1
Sample
28c58eec77701794958c1783549a32c0a414d801a5eb4a0347b13830447db215.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
28c58eec77701794958c1783549a32c0a414d801a5eb4a0347b13830447db215.exe
Resource
win10v2004-20220901-en
General
-
Target
28c58eec77701794958c1783549a32c0a414d801a5eb4a0347b13830447db215
-
Size
295KB
-
MD5
3fb2a824549432869c8070401f1ef85b
-
SHA1
4e926938a1189b84e05e2d373435452dbf585202
-
SHA256
28c58eec77701794958c1783549a32c0a414d801a5eb4a0347b13830447db215
-
SHA512
35f48b2d3d93dd40f90f32c3de97e32fbb4e675f5ae182ed5cb9b050292403640e6428b1dca1f9ecd20b99bee252cb47014ce92a168da8c96b15c5edbe3a6338
-
SSDEEP
6144:Ex9g5k7zmAjRLQ8Y11QvLA56ebhbbyRbb52rqCJ/SRTSC:m9NnFjpdvK/tb4kXSRTf
Malware Config
Signatures
Files
-
28c58eec77701794958c1783549a32c0a414d801a5eb4a0347b13830447db215.exe windows x86
c768b38e1432343fe847d902bd09985f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThreadId
FindAtomA
GetNumberFormatA
LocalFree
GetCurrentProcessId
CreateEventW
SetLastError
GetPrivateProfileStringA
EnumCalendarInfoA
HeapCreate
GetModuleHandleA
LocalFlags
FindClose
GetConsoleAliasA
GetDriveTypeW
EnterCriticalSection
lstrlenW
ReadFile
TlsGetValue
ResumeThread
user32
IsWindow
DispatchMessageA
GetKeyState
GetCursorInfo
GetClientRect
DrawTextA
SetFocus
GetMenuInfo
GetSysColor
CallWindowProcW
GetKeyboardType
DispatchMessageA
GetClassInfoA
stclient
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
ntshrui
IsPathSharedA
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 416KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 295KB - Virtual size: 294KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ