Static task
static1
Behavioral task
behavioral1
Sample
28cc8fa94d3e719feaaf13eb9a5519f2b3033eda7331d6c9d1b69ca77e4aea9c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
28cc8fa94d3e719feaaf13eb9a5519f2b3033eda7331d6c9d1b69ca77e4aea9c.exe
Resource
win10v2004-20220812-en
General
-
Target
28cc8fa94d3e719feaaf13eb9a5519f2b3033eda7331d6c9d1b69ca77e4aea9c
-
Size
342KB
-
MD5
92634f2fb345764faae1ba8b9fa970f0
-
SHA1
04edde767073598ee39d305b4fe979447491c14c
-
SHA256
28cc8fa94d3e719feaaf13eb9a5519f2b3033eda7331d6c9d1b69ca77e4aea9c
-
SHA512
42069c0214c85e52dbc1912c144fed1b91e30db9f32df91fa89942d66777842f73a33013725c133719c3227e23e1d33b9f1e683e43f46cb3fe2b0655b481dfd1
-
SSDEEP
6144:Ikt7LcSj5PSXyggMfOLRTYO+9wTLfdvyhEwFUsjRLTt+/Zql+Xvvn:zFhgh2R8O+yFqpLh+Bqs3n
Malware Config
Signatures
Files
-
28cc8fa94d3e719feaaf13eb9a5519f2b3033eda7331d6c9d1b69ca77e4aea9c.exe windows x86
3e87aa9103d0569f61940616132dd2d4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
CreateWaitableTimerA
CreateFileA
LoadLibraryExA
IsBadReadPtr
CreateFileMappingA
GetACP
GlobalLock
GlobalUnlock
CreateEventA
FindClose
GetModuleHandleA
FreeEnvironmentStringsA
LocalFree
lstrlenA
IsDebuggerPresent
GetStdHandle
CloseHandle
HeapCreate
GetConsoleCP
user32
DialogBoxParamA
GetDlgItem
GetDlgItemTextA
SetFocus
IsMenu
CheckMenuItem
GetParent
GetSubMenu
RedrawWindow
GetMessageA
ClipCursor
EndDialog
DispatchMessageA
DrawIconEx
apphelp
SdbFindFirstTag
SdbCloseDatabase
ApphelpShowDialog
ApphelpCheckRunApp
ApphelpCheckIME
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ