Static task
static1
Behavioral task
behavioral1
Sample
cf4fc5da3934c5da58ac6c45b306f5117b8d4be6c7dc860979daefef15264334.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cf4fc5da3934c5da58ac6c45b306f5117b8d4be6c7dc860979daefef15264334.dll
Resource
win10v2004-20220812-en
General
-
Target
cf4fc5da3934c5da58ac6c45b306f5117b8d4be6c7dc860979daefef15264334
-
Size
104KB
-
MD5
6f504bc10de76f9496a25f16a38036d4
-
SHA1
c39bada1fb29c95dc75eb35a0102f8bef3d2c131
-
SHA256
cf4fc5da3934c5da58ac6c45b306f5117b8d4be6c7dc860979daefef15264334
-
SHA512
23302623b30c38a4d2db99733edbb03e28f764c47fa48524922e2451924fd23e0cae39b74b151fa4038367d68b60a15fe7fd35d83cf55210e0972dc92944994f
-
SSDEEP
3072:x3hw4b6Xudr+MUiw5/IpUY2RChbgEkbw3KkK4yND:dm4b6XOwiw5/0uYxg3gKb5
Malware Config
Signatures
Files
-
cf4fc5da3934c5da58ac6c45b306f5117b8d4be6c7dc860979daefef15264334.dll windows x86
d70f84b5f8ca433c79befbc5f544a3f4
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CopyFileA
CreateFileA
FindFirstFileA
FindResourceA
FreeEnvironmentStringsW
FreeLibrary
GetCurrentThreadId
GetFileAttributesA
GetFileTime
GetFullPathNameA
GlobalAlloc
HeapAlloc
HeapCreate
InterlockedIncrement
MapViewOfFile
SetHandleCount
Sleep
lstrcpyA
user32
CallNextHookEx
CharUpperA
ClientToScreen
DispatchMessageA
EmptyClipboard
EnableWindow
GetKeyState
GetSubMenu
OffsetRect
OpenClipboard
SendMessageA
SetActiveWindow
SetDlgItemTextA
SetPropA
SetWindowLongA
SetWindowTextA
UnhookWindowsHookEx
Sections
.text Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 54KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ