Static task
static1
Behavioral task
behavioral1
Sample
c0604d45055b921b7047b7ace1a4b2148783bd4e79e9cf1c4fcab45750b435cd.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c0604d45055b921b7047b7ace1a4b2148783bd4e79e9cf1c4fcab45750b435cd.dll
Resource
win10v2004-20220812-en
General
-
Target
c0604d45055b921b7047b7ace1a4b2148783bd4e79e9cf1c4fcab45750b435cd
-
Size
141KB
-
MD5
c19e25c0eea07002fab88922e3f42ba6
-
SHA1
7e4d2efb7a20815a01fe9779966b624f950b6492
-
SHA256
c0604d45055b921b7047b7ace1a4b2148783bd4e79e9cf1c4fcab45750b435cd
-
SHA512
b05e5e4ce5426719d76e0a57b530ea8b3d5274fd1118ed791e9dac240ca5e1651baa760fc69036625f44fdea1af4e7f1e2a35f2302027a79d9c2d355683901fb
-
SSDEEP
3072:I6imdElMvSH3r7UkKVtFtfe7ZkWS0yOSmA4ERwcapHCk/KhxaSVxpcTZ:vimdt07Ko0OS542wcXEZSVxpE
Malware Config
Signatures
Files
-
c0604d45055b921b7047b7ace1a4b2148783bd4e79e9cf1c4fcab45750b435cd.dll windows x86
8eb28d2cdfafffd53ddc552118e4b75f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindClose
GetCommandLineA
GetCurrentProcessId
GetDateFormatA
GetOEMCP
GetStringTypeW
GlobalAddAtomA
HeapAlloc
HeapCreate
HeapDestroy
InterlockedExchange
LocalReAlloc
SetErrorMode
SetHandleCount
UnhandledExceptionFilter
UpdateResourceA
WritePrivateProfileStringA
lstrcmpA
lstrcmpiA
lstrcpyA
lstrlenW
user32
EmptyClipboard
GetClassInfoA
GetLastActivePopup
GetSysColorBrush
GetSystemMetrics
IsWindowVisible
LoadCursorA
ModifyMenuA
PostQuitMessage
SetTimer
TabbedTextOutA
ValidateRect
Sections
CODE Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ