Static task
static1
Behavioral task
behavioral1
Sample
dcb8572001a136d3a8ac87aebbd597fa3e6172f3b1ab51e9beb8528ef5d23cf8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dcb8572001a136d3a8ac87aebbd597fa3e6172f3b1ab51e9beb8528ef5d23cf8.exe
Resource
win10v2004-20221111-en
General
-
Target
dcb8572001a136d3a8ac87aebbd597fa3e6172f3b1ab51e9beb8528ef5d23cf8
-
Size
98KB
-
MD5
57f880b5171d06cde1022c1ca8fbc0b5
-
SHA1
61eff3840cbb29d61393efb82bb873677606f444
-
SHA256
dcb8572001a136d3a8ac87aebbd597fa3e6172f3b1ab51e9beb8528ef5d23cf8
-
SHA512
e9fe6638c8550aeff04b26da0fe10d114f67a840f2d2e6ac9a1751cb8521a9ed8c474bcab2debb827043434f312dc5cb56d6b13103659c3ec6bedf029d23fd63
-
SSDEEP
1536:c8v30Vsj+qaxciYFMedDFcGqE5zQd6v0deKZVTRVYBJS6jeXRndaM+PueC:c23CsKq0lSRZnqE5skMrVNgE6jeWN
Malware Config
Signatures
Files
-
dcb8572001a136d3a8ac87aebbd597fa3e6172f3b1ab51e9beb8528ef5d23cf8.exe windows x86
d44307c29fdf03c45625a11a69d5e338
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoA
VerFindFileA
ole32
CLSIDFromProgID
CLSIDFromString
gdi32
CreateFontIndirectA
CreateBitmap
SelectPalette
GetDIBits
CreatePenIndirect
oleaut32
RegisterTypeLib
SysStringLen
OleLoadPicture
GetErrorInfo
SafeArrayGetElement
SafeArrayGetUBound
SysReAllocStringLen
SysAllocStringLen
SafeArrayCreate
msvcrt
memcpy
memmove
strcmp
atan
kernel32
DeleteCriticalSection
HeapAlloc
DeleteFileA
SetEvent
GetUserDefaultLCID
WideCharToMultiByte
HeapDestroy
MulDiv
RaiseException
FormatMessageA
lstrcmpA
WriteFile
GetThreadLocale
CompareStringA
GetOEMCP
GetCurrentProcess
GetLocaleInfoA
ResetEvent
CreateFileA
GetDateFormatA
FindResourceA
LoadResource
GlobalAddAtomA
LocalFree
LocalReAlloc
WaitForSingleObject
GetVersionExA
LoadLibraryExA
VirtualFree
GetModuleHandleA
GetCurrentThreadId
GetCurrentThread
GlobalAlloc
LocalAlloc
GlobalDeleteAtom
GetFullPathNameA
GetProcAddress
ReadFile
EnumCalendarInfoA
GetCPInfo
CreateThread
SetLastError
GetFileAttributesA
VirtualQuery
MoveFileA
LoadLibraryA
lstrlenA
GetLocalTime
GetStringTypeW
EnterCriticalSection
LockResource
SetHandleCount
GetDiskFreeSpaceA
ExitThread
lstrcmpiA
SetFilePointer
InitializeCriticalSection
GetStartupInfoA
GetCommandLineA
GetSystemDefaultLangID
CloseHandle
GetCurrentProcessId
MoveFileExA
SetEndOfFile
VirtualAlloc
SetErrorMode
GetProcessHeap
comdlg32
GetOpenFileNameA
GetSaveFileNameA
user32
GetKeyNameTextA
GetCursorPos
GetWindowTextA
GetDesktopWindow
GetSysColor
GetPropA
MessageBoxA
GetSysColorBrush
IsWindowVisible
GetSubMenu
GetFocus
DrawEdge
DeferWindowPos
GetMenuState
DispatchMessageW
GetParent
IsChild
GetClientRect
GetScrollRange
GetMenuItemInfoA
SetWindowTextA
DefMDIChildProcA
GetCursor
GetMenuItemID
GetClassLongA
GetScrollPos
DrawTextA
IsWindowEnabled
DrawIcon
GetMenuStringA
DrawFrameControl
GetMessagePos
GetScrollInfo
GetWindow
BeginDeferWindowPos
Sections
CODE Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
BSS Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: 1024B - Virtual size: 673B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ