Static task
static1
Behavioral task
behavioral1
Sample
y7E48.tmp.dll
Resource
win7-20220414-en
General
-
Target
DLL.zip
-
Size
582KB
-
MD5
9ca8d509ce1112a615023a82c1e3140b
-
SHA1
cd12131725ce70e5b6dd58294119fbb3559d1a09
-
SHA256
50d8de5512fcac6e02cc576a59f15210a6d5842401deeab497ea9243c3586af4
-
SHA512
a14a5242a56041cd08ae9df0fa097c8db9091f7efe33c67be34aac5cf7681601a628583c71ffa9b5d33d859d5f6a43642ce7c314c0066dd0caa747497dc26d0f
-
SSDEEP
12288:0u6VQYwNXbVG9+08uDisL9OYGhLBNEfArwCzdbl2gijb3:0nwNXJgl2sXGBB8ArTNi3
Malware Config
Signatures
Files
-
DLL.zip.zip
Password: infected
-
y7E48.tmp.dll.zip.zip
Password: infected
-
y7E48.tmp.dll.dll windows x86
Password: infected
a6add3ee6681055674d116203cbe3e3c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
MkParseDisplayName
advapi32
LookupPrivilegeDisplayNameW
GetSecurityDescriptorControl
kernel32
GetCommConfig
lstrcmpiA
GetCommModemStatus
WaitForSingleObjectEx
CloseHandle
GetModuleHandleW
OutputDebugStringA
DeviceIoControl
Module32Next
shell32
ExtractAssociatedIconExW
secur32
InitializeSecurityContextA
powrprof
ReadPwrScheme
gdi32
GetOutlineTextMetricsW
DeleteDC
DeleteColorSpace
msvcrt
memset
_time64
user32
IsWindow
GetScrollInfo
GetUserObjectInformationA
GetClipboardFormatNameA
GetClientRect
ExitWindowsEx
Sections
.text Size: 96KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 548KB - Virtual size: 547KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 156KB - Virtual size: 165KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ