DllGetClassObject
DllRegisterServer
PluginInit
RunObject
Behavioral task
behavioral1
Sample
b4a0138a637e4f800e62d91923dc7f77809ab6bf8f27d621502cbe82b06db485.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
b4a0138a637e4f800e62d91923dc7f77809ab6bf8f27d621502cbe82b06db485.dll
Resource
win10v2004-20220414-en
Target
7501316140.zip
Size
7KB
MD5
6d80acc6170371d08f52e6595dfe48ac
SHA1
22dc1f60c59526ee6d4fb74b4d1e6d9cbc4d4286
SHA256
ccd7754174dfdc55c49b61cbba9ed782d43b1f5fd9c5611251c7526bf83f058e
SHA512
ca83585dc9f33fc04ba4be27e9e9d0dc24d8a57016e3df73a4e8844df7bac54c5de6bdfaf499d643b93ff54998aaa447a5021d10c7160732a7673592399bc3f9
SSDEEP
192:NeBPGzWJfyoIxBB+TJFtvuRhNCmEy2U+7kudt:ghGiJbeBmZWjxHpwkc
icedid
168463318
juniarhends.com
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
WinHttpCloseHandle
WinHttpOpen
WinHttpSendRequest
WinHttpConnect
WinHttpQueryHeaders
WinHttpReceiveResponse
WinHttpSetStatusCallback
WinHttpOpenRequest
WinHttpSetOption
WinHttpQueryDataAvailable
WinHttpReadData
wsprintfW
memset
SwitchToThread
CreateFileA
GetLastError
WideCharToMultiByte
lstrlenW
VirtualProtect
VirtualAlloc
lstrcatA
lstrcpyA
GetTempPathA
CreateDirectoryA
LoadLibraryA
GetProcAddress
GetComputerNameExW
Sleep
ExitProcess
CreateThread
HeapAlloc
HeapFree
GetProcessHeap
HeapReAlloc
WriteFile
CloseHandle
GetTickCount64
GetUserNameW
LookupAccountNameW
SHGetFolderPathA
DllGetClassObject
DllRegisterServer
PluginInit
RunObject
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE