SK
Static task
static1
Behavioral task
behavioral1
Sample
c53691203d798f647e2301a6ef5f44677ab637cb695006f94a8f29ad1d601908.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c53691203d798f647e2301a6ef5f44677ab637cb695006f94a8f29ad1d601908.dll
Resource
win10v2004-20221111-en
General
-
Target
c53691203d798f647e2301a6ef5f44677ab637cb695006f94a8f29ad1d601908
-
Size
24KB
-
MD5
443097b00f25efc1e0ef241ddcca6ca0
-
SHA1
d15615122543581a4979cec150d4e15b4e933264
-
SHA256
c53691203d798f647e2301a6ef5f44677ab637cb695006f94a8f29ad1d601908
-
SHA512
8a4f2069ef4e1167fa94e18abec3958847f262d53875a9ca9897b270f85a26c2b58c114c7ee06ffe564ae752c6b73e36e0cd8a64f5c337742b72332a7e785f03
-
SSDEEP
48:qoEWG+BJtw6ZKFKxyGK2akIm7NAgXQlmU+ldcQdB6HtdOkNaS+Ldg0wVoSEfocew:FbJa2EKxy2akIm73hU0NwdOusOWSrcy
Malware Config
Signatures
Files
-
c53691203d798f647e2301a6ef5f44677ab637cb695006f94a8f29ad1d601908.dll windows x86
affe47cdbacb3fd5a7e2542fc71ce41c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcess
GetProcAddress
LoadLibraryA
CloseHandle
WriteFile
SetFilePointer
CreateFileA
lstrcatA
GetCurrentProcessId
GetLocalTime
lstrcpyA
GetCurrentThreadId
user32
SetProcessWindowStation
OpenWindowStationA
GetThreadDesktop
GetProcessWindowStation
OpenDesktopA
SetThreadDesktop
SetWindowsHookExA
ToAscii
CallNextHookEx
GetActiveWindow
wsprintfA
GetWindowTextA
GetKeyboardState
msvcrt
_adjust_fdiv
malloc
_initterm
free
strlen
strcpy
Exports
Exports
Sections
.text Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 993B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 156B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Shared Size: 4KB - Virtual size: 264B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 258B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ