Static task
static1
Behavioral task
behavioral1
Sample
eb2e7e5e491cfa8744e16dfdb9ff5f4270d6ef63432ea2d1ade0fb54487ef33b.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
eb2e7e5e491cfa8744e16dfdb9ff5f4270d6ef63432ea2d1ade0fb54487ef33b.dll
Resource
win10v2004-en-20220113
General
-
Target
eb2e7e5e491cfa8744e16dfdb9ff5f4270d6ef63432ea2d1ade0fb54487ef33b
-
Size
368KB
-
MD5
388ad7944ffdd2e87a3b7cd178d65c86
-
SHA1
1407d7b934d900318a4cff58989d6534e6fcbe4a
-
SHA256
eb2e7e5e491cfa8744e16dfdb9ff5f4270d6ef63432ea2d1ade0fb54487ef33b
-
SHA512
824730e346f385404ca448eb7fe56fdf64d6645bfd6130c55867d340545ee84e4fe4f4db5ea0247a28e91298f6b3fa2ff47f9228462cb81154bc2c6a3ee301bc
-
SSDEEP
6144:A5BcJsIyrLrLrL+xCEw0I3JAUFlUC/V4IyCR9Omlta7rV50DErWNg/ydlb4fQ6w5:jzx0lgI0mltlDfNg6dNoQl+v4N
Malware Config
Signatures
Files
-
eb2e7e5e491cfa8744e16dfdb9ff5f4270d6ef63432ea2d1ade0fb54487ef33b.dll windows x86
567d5e2c9a13607a7679fee331273c6b
Code Sign
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
MessageBoxA
GetForegroundWindow
DestroyWindow
PostQuitMessage
ShutdownBlockReasonCreate
DefWindowProcA
AnimateWindow
AdjustWindowRect
wsprintfW
ShutdownBlockReasonDestroy
RegisterClassExW
CreateWindowExW
GetMessageA
TranslateMessage
DispatchMessageA
EnumChildWindows
ReleaseDC
CloseWindow
wsprintfA
MessageBoxW
DeferWindowPos
gdi32
SetPixel
DeleteObject
SelectPalette
SetPaletteEntries
GetDeviceCaps
kernel32
lstrcpyA
WaitForSingleObject
lstrcatA
GetProcAddress
lstrlenW
CreateDirectoryW
GetLastError
LocalAlloc
TlsSetValue
lstrcpynW
HeapAlloc
lstrcatW
VirtualFree
FindNextFileW
lstrcmpW
OutputDebugStringW
FindClose
GetTickCount
ExitThread
CreateThread
CloseHandle
TlsGetValue
ExitProcess
LoadLibraryA
VirtualAlloc
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
WriteFile
GetModuleHandleW
GetSystemDirectoryW
CreateProcessW
GetShortPathNameW
GetModuleHandleA
Sleep
lstrlenA
GetCurrentProcessId
VirtualQuery
VirtualProtect
IsBadReadPtr
FreeLibrary
lstrcmpA
AllocConsole
GetStdHandle
WriteConsoleW
UnmapViewOfFile
lstrcmpiW
lstrcpyW
SetFileAttributesW
MoveFileExW
FindFirstFileW
WaitForMultipleObjects
GetDriveTypeW
GetTickCount64
SetThreadExecutionState
GetCommandLineW
CreateMutexW
GetFileSizeEx
IsProcessorFeaturePresent
ReadFile
CreateFileMappingW
MapViewOfFile
GetCurrentProcess
LocalFree
GetUserDefaultUILanguage
InitializeCriticalSection
DeleteCriticalSection
SetLastError
EnterCriticalSection
LeaveCriticalSection
TerminateThread
GlobalAlloc
GlobalFree
Beep
GetVersionExA
ExpandEnvironmentStringsW
CreateFileW
SetFilePointerEx
advapi32
LookupAccountSidW
EqualDomainSid
LsaFreeMemory
CryptGenRandom
LsaCreateTrustedDomainEx
CryptDecrypt
CryptEncrypt
CryptImportKey
GetSidSubAuthority
GetSidSubAuthorityCount
LsaClose
CryptReleaseContext
CryptDestroyKey
AreAllAccessesGranted
CryptExportKey
CryptGenKey
CryptAcquireContextW
LsaAddAccountRights
LsaQueryTrustedDomainInfo
EncryptionDisable
shell32
ShellExecuteExW
SHGetFolderPathW
secur32
LsaConnectUntrusted
netapi32
DsRoleGetPrimaryDomainInformation
DsRoleFreeMemory
shlwapi
StrStrW
StrToIntA
mpr
WNetOpenEnumW
WNetEnumResourceW
WNetCloseEnum
WNetAddConnection2W
ws2_32
shutdown
closesocket
connect
htons
inet_addr
WSAGetLastError
WSACleanup
socket
WSAStartup
inet_pton
send
gethostbyname
inet_ntoa
recv
wininet
InternetReadFile
InternetCloseHandle
HttpQueryInfoA
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
InternetCrackUrlA
InternetOpenA
crypt32
CryptBinaryToStringW
CryptBinaryToStringA
CryptStringToBinaryA
ole32
CoInitializeEx
CoUninitialize
CoCreateInstance
oleaut32
VariantClear
VariantInit
Sections
.text Size: 225KB - Virtual size: 224KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 66KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ