DllMain
Static task
static1
Behavioral task
behavioral1
Sample
008a674e33435ce0b892d0a68ac6d01f9606c040da87b21a10ed069729ee04ff.dll
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
008a674e33435ce0b892d0a68ac6d01f9606c040da87b21a10ed069729ee04ff.dll
Resource
win10v2004-en-20220113
General
-
Target
008a674e33435ce0b892d0a68ac6d01f9606c040da87b21a10ed069729ee04ff
-
Size
164KB
-
MD5
5cee9f5471e84ef4df2733d371e019d9
-
SHA1
8f3d62d73b70267156e40a3cebe16430718aa4d4
-
SHA256
008a674e33435ce0b892d0a68ac6d01f9606c040da87b21a10ed069729ee04ff
-
SHA512
69758a183204feed5ced5e1838c58e309861da098f4b54a8f758bf520b0e1a326687a2b0f19e97209f118b39c95545fe9b1b585f859e25857b9043816c88092a
-
SSDEEP
3072:LgjO2yg5iUN+Sh0dCh/0HSMRNX4+OCMNego6AZ+qZoz:Ltjg5bThmM2SQNgAZ+q
Malware Config
Signatures
Files
-
008a674e33435ce0b892d0a68ac6d01f9606c040da87b21a10ed069729ee04ff.dll windows x64
6739a8e2099115036a82e0f2cc7f27a1
Code Sign
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetOEMCP
GetCommandLineW
GetCurrentProcess
GetThreadErrorMode
GetUserDefaultLangID
GetUserDefaultUILanguage
FlushProcessWriteBuffers
GetLargePageMinimum
GetCurrentThreadId
UnregisterApplicationRecoveryCallback
IsSystemResumeAutomatic
GetSystemDefaultLangID
GetACP
GetCommandLineA
GetTickCount64
GetLastError
GetCurrentThread
GetCurrentProcessorNumber
GetErrorMode
UnregisterApplicationRestart
SetFileApisToOEM
GetTickCount
IsDebuggerPresent
GetLogicalDrives
GetSystemDefaultUILanguage
GetThreadLocale
GetThreadUILanguage
TlsAlloc
SwitchToThread
GetEnvironmentStringsW
AreFileApisANSI
VirtualAlloc
ExitProcess
WriteConsoleW
CloseHandle
CreateFileW
SetFilePointerEx
GetConsoleMode
GetConsoleCP
WriteFile
FlushFileBuffers
SetStdHandle
HeapReAlloc
HeapSize
GetStringTypeW
GetFileType
GetStdHandle
GetProcessHeap
LCMapStringW
VirtualProtect
FreeEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetCPInfo
IsValidCodePage
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeSListHead
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
RtlUnwindEx
InterlockedFlushSList
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
EncodePointer
RaiseException
RtlPcToFileHeader
TerminateProcess
GetModuleHandleExW
GetModuleFileNameW
HeapAlloc
HeapFree
FindClose
FindFirstFileExW
FindNextFileW
user32
SetProcessDPIAware
GetProcessWindowStation
GetDesktopWindow
GetCursor
GetShellWindow
AnyPopup
GetMenuCheckMarkDimensions
CloseClipboard
GetKBCodePage
DestroyCaret
CreateMenu
GetMessageExtraInfo
GetFocus
GetClipboardViewer
GetOpenClipboardWindow
GetActiveWindow
InSendMessage
GetCapture
EmptyClipboard
CountClipboardFormats
IsProcessDPIAware
GetForegroundWindow
GetDialogBaseUnits
GetMessageTime
IsWow64Message
GetClipboardSequenceNumber
gdi32
GdiFlush
shell32
InitNetworkAddressControl
ole32
CoFreeUnusedLibraries
CoUninitialize
Exports
Exports
Sections
.text Size: 90KB - Virtual size: 90KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 148B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ