Run
Static task
static1
Behavioral task
behavioral1
Sample
5e3907e9e2ed8ff12bb4e96b52401d871526c5ed502d2149dd4f680da4925590.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
5e3907e9e2ed8ff12bb4e96b52401d871526c5ed502d2149dd4f680da4925590.dll
Resource
win10v2004-en-20220113
General
-
Target
5e3907e9e2ed8ff12bb4e96b52401d871526c5ed502d2149dd4f680da4925590
-
Size
2.3MB
-
MD5
8edfa086de4dfdc93c0551bbb08cd5a8
-
SHA1
4b1b5bed35bc676e835de14ee033339d37f4549d
-
SHA256
5e3907e9e2ed8ff12bb4e96b52401d871526c5ed502d2149dd4f680da4925590
-
SHA512
c91371d98116c58c9f2728e53079708e423145da9e25384b9e5d69efa3a3c29614bde40eec66cb38c33a12c42bf9074af8d7f29fccc4974ad3d5e871aef89385
-
SSDEEP
24576:SdimFPqIwKa4vP8up7Exb5gczxXBvGvo/8vgH1LYZE7sAEsYt7RlPIUhjneH1Y3:SdiIwKtnYxVHzksYJJ8YFC
Malware Config
Signatures
Files
-
5e3907e9e2ed8ff12bb4e96b52401d871526c5ed502d2149dd4f680da4925590.dll windows x86
6cfc78e272a5312f54fe96bcd75731b5
Code Sign
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
RaiseException
DecodePointer
GetProcAddress
DeleteCriticalSection
TerminateProcess
Sleep
GetVersionExA
GlobalAlloc
GlobalFree
CloseHandle
VirtualAllocEx
ReadProcessMemory
ReadFile
GetTempPathA
DeleteFileA
SetFileAttributesA
GetTempFileNameA
FindFirstFileW
HeapFree
FindNextFileW
FindClose
GetLastError
HeapSize
GetLogicalDriveStringsW
FileTimeToSystemTime
HeapReAlloc
HeapAlloc
GetProcessHeap
CreateDirectoryW
GetCommandLineW
GetModuleFileNameW
WaitForSingleObject
TerminateThread
CreateThread
CreateProcessW
IsDebuggerPresent
OutputDebugStringW
EnterCriticalSection
LeaveCriticalSection
GetSystemDirectoryW
WriteConsoleW
GetStringTypeW
GetCommandLineA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
IsValidCodePage
InitializeCriticalSectionEx
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
GetModuleHandleW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
IsProcessorFeaturePresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
EncodePointer
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
InterlockedFlushSList
SetLastError
RtlUnwind
CreateFileW
GetFileType
ExitProcess
GetModuleHandleExW
MultiByteToWideChar
WideCharToMultiByte
WriteFile
GetConsoleCP
GetConsoleMode
GetACP
GetStdHandle
ReadConsoleW
SetFilePointerEx
FlushFileBuffers
SetStdHandle
SetEndOfFile
GetFileAttributesExW
LCMapStringW
user32
wsprintfW
ShowWindow
shell32
SHGetSpecialFolderPathW
SHGetSpecialFolderPathA
shlwapi
PathAppendA
PathFindFileNameW
StrStrIA
PathFileExistsW
PathAppendW
StrCmpIW
StrStrIW
advapi32
SystemFunction036
Exports
Exports
Sections
.text Size: 118KB - Virtual size: 117KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 272B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 262KB - Virtual size: 262KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.vlizer Size: 1.9MB - Virtual size: 1.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE