Static task
static1
Behavioral task
behavioral1
Sample
067d89c1270799d20eecb3b91e644a634adacb154cf2a1c186c0f58b74090f43.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
067d89c1270799d20eecb3b91e644a634adacb154cf2a1c186c0f58b74090f43.dll
Resource
win10v2004-20220414-en
General
-
Target
067d89c1270799d20eecb3b91e644a634adacb154cf2a1c186c0f58b74090f43
-
Size
274KB
-
MD5
e9143086453d552f0780426acb0af541
-
SHA1
740d5931036fe041e77a79b204969c2e0fe059ea
-
SHA256
067d89c1270799d20eecb3b91e644a634adacb154cf2a1c186c0f58b74090f43
-
SHA512
bc497bc12b08c90ae824b09704901d90c4cf66c355a6d384c2d69d16ef9e7a36ab97c968076056e58b5771f6182d82f52e77a86d62ccc9b1086bfd2ca54fc7bc
-
SSDEEP
1536:6x80BvzE7mtdyPbJKuNSE4pv2LHGEGqGgKGGGqGKGqGGjGuGqGSGqGvtEGmGeGqW:TmLztdyj914p+VeZYW5weZYW5we0dxP
Malware Config
Signatures
Files
-
067d89c1270799d20eecb3b91e644a634adacb154cf2a1c186c0f58b74090f43.dll windows x86
ec8c8487253b02dbfed5ec46436333db
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TlsSetValue
TlsGetValue
LocalAlloc
GetModuleHandleW
lstrlenW
lstrcmpA
WritePrivateProfileStringW
WriteFile
WaitForSingleObject
VirtualQuery
VirtualProtect
VirtualFree
VirtualAlloc
UnmapViewOfFile
TerminateThread
TerminateProcess
SystemTimeToFileTime
SuspendThread
Sleep
SizeofResource
SetUnhandledExceptionFilter
SetThreadPriority
SetLastError
SetFilePointer
SetFileAttributesA
SetEvent
SetEndOfFile
ResumeThread
ResetEvent
RemoveDirectoryA
ReleaseMutex
ReadProcessMemory
ReadFile
RaiseException
QueryPerformanceFrequency
QueryPerformanceCounter
OutputDebugStringW
OpenProcess
OpenFileMappingA
OpenFileMappingW
MulDiv
MoveFileW
MapViewOfFile
LockResource
LocalSize
LocalFree
LoadResource
LoadLibraryExA
LoadLibraryW
LeaveCriticalSection
IsBadReadPtr
InitializeCriticalSection
GlobalUnlock
GlobalReAlloc
GlobalMemoryStatus
GlobalHandle
GlobalLock
GlobalFree
GlobalAlloc
GetWindowsDirectoryA
GetVersionExA
GetVersionExW
GetVersion
GetTickCount
GetThreadPriority
GetThreadLocale
GetThreadContext
GetTempPathA
GetSystemTime
GetSystemDirectoryW
GetProcAddress
GetPrivateProfileStringW
GetPriorityClass
GetModuleHandleA
GetModuleFileNameA
GetModuleFileNameW
GetLocaleInfoA
GetLocalTime
GetLastError
GetFileTime
GetFileSize
GetFileAttributesA
GetFileAttributesW
GetDiskFreeSpaceA
GetCurrentThreadId
GetCurrentThread
GetCurrentProcessId
GetCurrentProcess
GetComputerNameA
GetCommandLineA
GetCommandLineW
FreeResource
InterlockedIncrement
InterlockedExchangeAdd
InterlockedExchange
InterlockedDecrement
InterlockedCompareExchange
FreeLibrary
FormatMessageA
FindResourceA
FindResourceW
FindNextFileA
FindFirstFileA
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
FileTimeToDosDateTime
ExpandEnvironmentStringsA
ExitThread
ExitProcess
EnterCriticalSection
DuplicateHandle
DeleteFileA
DeleteFileW
DeleteCriticalSection
CreateThread
CreateRemoteThread
CreateProcessA
CreateProcessW
CreatePipe
CreateMutexA
CreateMutexW
CreateFileMappingA
CreateFileMappingW
CreateFileA
CreateFileW
CreateEventW
CreateDirectoryA
CopyFileA
CloseHandle
Beep
RtlUnwind
_lcreat
WriteFileEx
PeekConsoleInputA
FreeConsole
GetFileAttributesExA
SetConsoleMode
GetComputerNameW
ReplaceFileW
GetFileInformationByHandle
BeginUpdateResourceA
LoadLibraryA
user32
CreateWindowExA
CreateWindowExW
WindowFromPoint
TranslateMessage
SystemParametersInfoW
ShowWindow
SetWindowTextA
SetWindowPos
SetWindowLongA
SetTimer
SetRect
SetForegroundWindow
SetFocus
SetCursor
SetClipboardData
SetCapture
SetActiveWindow
SendMessageTimeoutA
SendMessageA
SendMessageW
ScreenToClient
RemoveMenu
ReleaseDC
ReleaseCapture
RegisterWindowMessageW
RegisterClipboardFormatW
RegisterClassA
PtInRect
PostThreadMessageA
PostThreadMessageW
PostQuitMessage
PostMessageA
PostMessageW
PeekMessageA
PeekMessageW
OpenClipboard
OffsetRect
MessageBoxA
MessageBeep
LoadImageA
LoadCursorW
KillTimer
IsWindowVisible
IsWindowUnicode
IsWindowEnabled
IsWindow
IsIconic
IsDialogMessageW
InvalidateRect
InflateRect
GetWindowThreadProcessId
GetWindowTextA
GetWindowRect
GetWindowPlacement
GetWindowLongW
GetWindowDC
GetSystemMetrics
GetSystemMenu
GetSysColorBrush
GetSysColor
GetWindow
GetMessageA
GetMessageW
GetKeyState
GetIconInfo
GetFocus
GetDC
GetCursorPos
GetCursor
GetClientRect
GetClassNameA
GetCapture
FrameRect
FindWindowW
FillRect
EnumWindows
EndPaint
EnableWindow
EmptyClipboard
DrawTextA
DrawTextW
DrawIconEx
DrawFrameControl
DrawFocusRect
DispatchMessageW
DestroyWindow
DefWindowProcA
DefWindowProcW
CloseClipboard
CallWindowProcW
BringWindowToTop
BeginPaint
AttachThreadInput
UpdateWindow
LoadAcceleratorsW
LoadCursorFromFileW
RedrawWindow
DefFrameProcW
GetClipboardFormatNameA
WindowFromDC
TrackPopupMenuEx
LoadMenuA
GetWindowRgn
EnableMenuItem
UnregisterClassW
MessageBoxW
CloseWindow
CharNextW
GetMenuItemCount
GetDlgCtrlID
GetCaretBlinkTime
OemKeyScan
VkKeyScanW
DestroyCursor
GetTopWindow
CopyIcon
GetThreadDesktop
PaintDesktop
DestroyIcon
CharNextA
DrawMenuBar
LoadIconW
gdi32
TextOutA
StretchDIBits
StretchBlt
StartPage
StartDocA
SetTextColor
SetStretchBltMode
SetMapMode
SetBkMode
SetBkColor
SelectPalette
SelectObject
SelectClipRgn
ResizePalette
RealizePalette
MoveToEx
LineTo
GetTextMetricsW
GetTextFaceA
GetTextExtentPoint32A
GetStockObject
GetRgnBox
GetPaletteEntries
GetObjectType
GetObjectW
GetNearestPaletteIndex
GetDeviceCaps
GetDIBits
GetCurrentObject
GetClipBox
GdiFlush
EndPage
EndDoc
DeleteObject
DeleteDC
CreateSolidBrush
CreateRectRgnIndirect
CreatePen
CreatePalette
CreateHalftonePalette
CreateFontA
CreateFontW
CreateDIBSection
CreateDCW
CreateCompatibleDC
CreateCompatibleBitmap
CombineRgn
BitBlt
GetNearestColor
EngCreateClip
GetCharABCWidthsFloatA
GetKerningPairs
EngEraseSurface
GetOutlineTextMetricsW
CLIPOBJ_bEnum
Chord
DescribePixelFormat
GetSystemPaletteUse
EngStrokePath
GetTextExtentPointI
FlattenPath
GetLayout
GetTextCharacterExtra
GetDCPenColor
AddFontResourceW
GetTextColor
CloseEnhMetaFile
GetBkMode
comdlg32
PrintDlgW
GetSaveFileNameA
advapi32
SetSecurityDescriptorDacl
RegSetValueExA
RegQueryValueExA
RegQueryValueExW
RegQueryInfoKeyW
RegOpenKeyExA
RegOpenKeyExW
RegEnumKeyA
RegDeleteValueA
RegCreateKeyExA
RegCloseKey
InitializeSecurityDescriptor
GetUserNameA
GetUserNameW
FreeSid
AllocateAndInitializeSid
shell32
ShellExecuteExA
ShellExecuteA
ShellExecuteW
SHGetSpecialFolderPathW
SHGetPathFromIDListA
SHGetSpecialFolderLocation
SHGetMalloc
SHChangeNotify
SHInvokePrinterCommandW
DragFinish
SHFileOperationA
DragAcceptFiles
DuplicateIcon
SHGetFolderPathW
SHPathPrepareForWriteW
SHIsFileAvailableOffline
Shell_NotifyIcon
ExtractAssociatedIconExW
SHGetFolderPathA
ShellHookProc
DragQueryFileW
ExtractIconExW
ShellExecuteExW
SHBrowseForFolderA
CheckEscapesW
SHCreateDirectoryExW
SHAppBarMessage
ShellAboutA
CommandLineToArgvW
ole32
CoCreateInstance
shlwapi
StrRStrIA
StrCmpNIW
StrRChrIW
StrRChrIA
StrChrA
StrStrA
StrChrW
StrCmpNIA
StrRChrA
comctl32
ImageList_Destroy
ImageList_Create
ord17
Sections
.txt Size: 252KB - Virtual size: 252KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 245B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ