rusp
Static task
static1
Behavioral task
behavioral1
Sample
dcb941939d684d2ef345aae68ce25bd582500264c48f1cc5061ff0484994995d.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
dcb941939d684d2ef345aae68ce25bd582500264c48f1cc5061ff0484994995d.dll
Resource
win10v2004-20221111-en
General
-
Target
dcb941939d684d2ef345aae68ce25bd582500264c48f1cc5061ff0484994995d
-
Size
104KB
-
MD5
8f2d4c4d3274ab6284d8f3b11b05523a
-
SHA1
90c05b0d3847e91508d25b2df5fe2c68982be177
-
SHA256
dcb941939d684d2ef345aae68ce25bd582500264c48f1cc5061ff0484994995d
-
SHA512
319ff56c7bb98a09279de8b9da6ed7c8c074823f9f1842b0a96629b69222bbed4de7a05389ec1fad89c9133759b5b0915704074af60011bc6a0ec388116c5139
-
SSDEEP
3072:n0ETY26SMkTthc73c5TLVrEtk/E9N0weZkDE6:Ts26bt0VrEtR0Dk
Malware Config
Signatures
Files
-
dcb941939d684d2ef345aae68ce25bd582500264c48f1cc5061ff0484994995d.dll windows x86
76617e1a081d29216f976c00e1630357
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
MessageBoxA
wsprintfA
CharNextA
LoadStringA
CharPrevA
MessageBoxExA
advapi32
GetSidLengthRequired
FreeSid
GetSecurityDescriptorDacl
RegEnumValueA
SetFileSecurityA
SetSecurityDescriptorDacl
GetSidSubAuthority
InitializeAcl
AddAccessAllowedAce
InitializeSecurityDescriptor
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
RegOpenKeyExA
RegCloseKey
InitializeSid
RegQueryValueExA
AllocateAndInitializeSid
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
shell32
SHGetMalloc
SHGetSpecialFolderLocation
SHGetPathFromIDListA
Exports
Exports
Sections
.text Size: 60KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 486B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ