Static task
static1
Behavioral task
behavioral1
Sample
890844acc3e79d5c8136caddccf8b14a5d004fc20145885d7cb9ce36cf66671b.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
890844acc3e79d5c8136caddccf8b14a5d004fc20145885d7cb9ce36cf66671b.dll
Resource
win10v2004-20220901-en
General
-
Target
890844acc3e79d5c8136caddccf8b14a5d004fc20145885d7cb9ce36cf66671b
-
Size
69KB
-
MD5
e5a93c12984585a67063c2b1cc8cdb53
-
SHA1
b443395fe1a772151b3eba69a1cfa491f8f061cc
-
SHA256
890844acc3e79d5c8136caddccf8b14a5d004fc20145885d7cb9ce36cf66671b
-
SHA512
efaea03977dd2e5d8debd448ec3a17b18524a519a9585fb7b5b618ccf9d2448efac99589389757d3c89da08090fb8579c76e5532247496572fdd0ad40b84a859
-
SSDEEP
1536:ouRKd4Js/CfzfYNrTQ48++G1Eb2ofWUeTN8+ghEg:zRKd42AzfKQd++iEb2ofN3DhEg
Malware Config
Signatures
Files
-
890844acc3e79d5c8136caddccf8b14a5d004fc20145885d7cb9ce36cf66671b.dll windows x86
d70f84b5f8ca433c79befbc5f544a3f4
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CopyFileA
CreateFileA
FindFirstFileA
FindResourceA
FreeEnvironmentStringsW
FreeLibrary
GetCurrentThreadId
GetFileAttributesA
GetFileTime
GetFullPathNameA
GlobalAlloc
HeapAlloc
HeapCreate
InterlockedIncrement
MapViewOfFile
SetHandleCount
Sleep
lstrcpyA
user32
CallNextHookEx
CharUpperA
ClientToScreen
DispatchMessageA
EmptyClipboard
EnableWindow
GetKeyState
GetSubMenu
OffsetRect
OpenClipboard
SendMessageA
SetActiveWindow
SetDlgItemTextA
SetPropA
SetWindowLongA
SetWindowTextA
UnhookWindowsHookEx
Sections
CODE Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: 1024B - Virtual size: 894B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ