Static task
static1
Behavioral task
behavioral1
Sample
28f0429fa6627780580b1b2badee234a86591ce5bb651d4e79a3cb7779d8ecfe.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
28f0429fa6627780580b1b2badee234a86591ce5bb651d4e79a3cb7779d8ecfe.dll
Resource
win10v2004-20220812-en
General
-
Target
28f0429fa6627780580b1b2badee234a86591ce5bb651d4e79a3cb7779d8ecfe
-
Size
59KB
-
MD5
0ab53a7f69efa923e6fe81a3be355a76
-
SHA1
4cc6151057f7dc13fc36660872468db02a9cec2a
-
SHA256
28f0429fa6627780580b1b2badee234a86591ce5bb651d4e79a3cb7779d8ecfe
-
SHA512
cc9aae7cd6f1d229c054d401e5a4aec5ec5999466a8b0b949ba944625b1db0f619f0ae53a5b77916c312ac84993ef2d0f37771fb7b7d069298f18470c1a00c37
-
SSDEEP
1536:IRL6Gl+c+IEXrASRdlH1izrrFXd9jmFyrf7fLZ2:IBkImrAWMzrrQ8fLZ2
Malware Config
Signatures
Files
-
28f0429fa6627780580b1b2badee234a86591ce5bb651d4e79a3cb7779d8ecfe.dll windows x86
f52e3c578065a4cd02d92745471a27e1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadFile
SetFilePointer
CloseHandle
CreateFileA
GetModuleFileNameA
GetModuleHandleA
InterlockedDecrement
GetProcessHeap
HeapFree
EnumCalendarInfoExA
QueryPerformanceFrequency
CreateDirectoryW
LoadLibraryW
IsBadWritePtr
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
CompareStringA
WaitForMultipleObjects
HeapAlloc
ExitProcess
advapi32
RegOpenKeyExA
RegEnumKeyA
RegQueryValueExA
RegOpenKeyA
RegCloseKey
RegDeleteValueW
RegEnumValueA
RegOpenKeyExW
Sections
.text Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data1 Size: 512B - Virtual size: 1B
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 514B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ