Static task
static1
Behavioral task
behavioral1
Sample
dc5590e027a6b09b03646e2959d5636c4df2371295babcf3ae45cb99487839c1.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
dc5590e027a6b09b03646e2959d5636c4df2371295babcf3ae45cb99487839c1.exe
Resource
win10v2004-20220812-en
General
-
Target
dc5590e027a6b09b03646e2959d5636c4df2371295babcf3ae45cb99487839c1
-
Size
304KB
-
MD5
af86260a410fca324c898fe85061470c
-
SHA1
c50ad8676d9e7fdd7822a8c1f1c87acbf1eb9d53
-
SHA256
dc5590e027a6b09b03646e2959d5636c4df2371295babcf3ae45cb99487839c1
-
SHA512
d15aa11a92f9a3dff7a5b6583e7e9a358915dfdce45012542f8cee0539933f2352ac417f3efbde060720012b6e8d8548d0eab948ab8fcd9d4017a48cb936bea7
-
SSDEEP
6144:aSUJMuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuutukL+9vLVVKqGDwS55HVV8y48iJ:FUVU+xpix9paxUOaRz11YLVxyjtBS
Malware Config
Signatures
Files
-
dc5590e027a6b09b03646e2959d5636c4df2371295babcf3ae45cb99487839c1.exe windows x86
ae54b3bbd8301ac1bdbff6fe8cfd3255
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindAtomW
GetLocalTime
CloseHandle
VirtualAlloc
CreateFileA
GetExitCodeProcess
lstrlenA
FreeConsole
GetFileAttributesW
GetModuleHandleW
FindVolumeClose
GlobalFree
GetComputerNameA
GetTickCount
ExitThread
LocalFree
GetPrivateProfileIntA
GetDriveTypeA
TlsGetValue
ReadFile
user32
GetClassInfoA
DrawStateA
GetDlgItem
DestroyCaret
GetClientRect
CloseWindow
GetCaretPos
CreateWindowExA
FillRect
GetMenu
EndDialog
CallWindowProcA
DispatchMessageA
clbcatq
ComPlusMigrate
DllGetClassObject
ComPlusMigrate
ComPlusMigrate
ComPlusMigrate
gpedit
DllGetClassObject
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 352KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 295KB - Virtual size: 294KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ