Static task
static1
Behavioral task
behavioral1
Sample
dc5cd28c5512edb17a15e85a0e475ca49d91813c2de1ea341d17c37dbb45ec14.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dc5cd28c5512edb17a15e85a0e475ca49d91813c2de1ea341d17c37dbb45ec14.exe
Resource
win10v2004-20220901-en
General
-
Target
dc5cd28c5512edb17a15e85a0e475ca49d91813c2de1ea341d17c37dbb45ec14
-
Size
305KB
-
MD5
54101b9122d6c3c51a874740e9a15e3e
-
SHA1
10a480374e99576e675de0dbe09e7dc7109ff174
-
SHA256
dc5cd28c5512edb17a15e85a0e475ca49d91813c2de1ea341d17c37dbb45ec14
-
SHA512
54b9c4d71c992f806bb11e05bb81dcbe169fa65fc31f6f8176fb5b7aceb4a1811563dd7b8163142c95e1c194d1b22af7d10d9ed8c221893eb87298052189b734
-
SSDEEP
6144:+yhRKy8rUdFAD6KULXdnsR8kElLlz+XEBl6n8XU9nxPiIKxm9:+Soy8gdG2jiQ+Y2pZivx
Malware Config
Signatures
Files
-
dc5cd28c5512edb17a15e85a0e475ca49d91813c2de1ea341d17c37dbb45ec14.exe windows x86
b4ef0bcc3429d188f30b7adcc2d03015
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadFile
lstrlenA
FindAtomW
HeapCreate
GetCurrentThreadId
SetEvent
GetDriveTypeW
GetModuleFileNameA
GetFileAttributesA
EnumCalendarInfoW
ResumeThread
CreateMailslotA
GetConsoleAliasW
LocalFree
SetLastError
FindClose
GetCurrentProcessId
GetModuleHandleA
EnterCriticalSection
GetPrivateProfileStringW
user32
GetKeyboardType
GetKeyState
GetClassInfoA
DispatchMessageA
GetClientRect
IsWindow
GetCursorInfo
SetFocus
CallWindowProcW
DispatchMessageA
GetSysColor
GetMenuInfo
DrawTextW
admparse
IsAdmDirty
IsAdmDirty
IsAdmDirty
IsAdmDirty
IsAdmDirty
msasn1
ASN1BERDecBool
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 416KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 295KB - Virtual size: 294KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ