DllGetClassObject
DllRegisterServer
PluginInit
RunObject
Static task
static1
Behavioral task
behavioral1
Sample
51ab7bee5c23093e4eed61629dd74f22.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
51ab7bee5c23093e4eed61629dd74f22.dll
Resource
win10v2004-20220414-en
Target
51ab7bee5c23093e4eed61629dd74f22.dll
Size
13KB
MD5
51ab7bee5c23093e4eed61629dd74f22
SHA1
1a7a730d9e50c373fb0f4ab92cceaf26bfcd3d3c
SHA256
2fa82bdf1836fc7f61d09637580ca0ea26f3aed7e59acad9cd7f793148368214
SHA512
f74624982337a372293d0dac5e48308367841bc755c9950a7aa0110e17f1dd136892791d85cb1f5d5433ece22dca552bfdc3bb2f402fccb0059f86432c1f794d
SSDEEP
192:sHVMfa7TTCjJSixzPSAA56RCK7Yu/VPgwuPXBAQYfPq/3Kb:s1Mf0gJSix2AA56RCiZV6GQYnq/6b
icedid
3289900935
ilzenhwery.com
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
WinHttpCloseHandle
WinHttpOpen
WinHttpSendRequest
WinHttpConnect
WinHttpQueryHeaders
WinHttpReceiveResponse
WinHttpSetStatusCallback
WinHttpOpenRequest
WinHttpSetOption
WinHttpQueryDataAvailable
WinHttpReadData
wsprintfW
memset
SwitchToThread
CreateFileA
GetLastError
WideCharToMultiByte
lstrlenW
VirtualProtect
VirtualAlloc
lstrcatA
lstrcpyA
GetTempPathA
CreateDirectoryA
LoadLibraryA
GetProcAddress
GetComputerNameExW
Sleep
ExitProcess
CreateThread
HeapAlloc
HeapFree
GetProcessHeap
HeapReAlloc
WriteFile
CloseHandle
GetTickCount64
GetUserNameW
LookupAccountNameW
SHGetFolderPathA
DllGetClassObject
DllRegisterServer
PluginInit
RunObject
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE