DllGetClassObject
DllRegisterServer
PluginInit
RunObject
Behavioral task
behavioral1
Sample
27cd8f040ec3fc2125aa9a2cfedc8f4e3abf73aa2ed1bc9ab52aa977177ac952 (1).dll
Resource
win10-20220414-en
Target
27cd8f040ec3fc2125aa9a2cfedc8f4e3abf73aa2ed1bc9ab52aa977177ac952 (1).bin
Size
13KB
MD5
11ea8ecf4a9164f6329d29f66edea322
SHA1
0a7e2991d66b1326c8193c317278249e24d262dd
SHA256
27cd8f040ec3fc2125aa9a2cfedc8f4e3abf73aa2ed1bc9ab52aa977177ac952
SHA512
12e2189c34a85e67537e4687b32ee4583137135e7bd6bb81777270db669c6dc2a61a1ac4bf00c95e066f66596f0f4957d1a8b0ab872328bb176dbeb9f3f93213
SSDEEP
192:hHVMfa7TTCjJSixzPSAA56RCK7Yu/VPgwUXBAQYfPq/3Kb:h1Mf0gJSix2AA56RCiZVkGQYnq/6b
icedid
3000901376
yolneanz.com
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
WinHttpCloseHandle
WinHttpOpen
WinHttpSendRequest
WinHttpConnect
WinHttpQueryHeaders
WinHttpReceiveResponse
WinHttpSetStatusCallback
WinHttpOpenRequest
WinHttpSetOption
WinHttpQueryDataAvailable
WinHttpReadData
wsprintfW
memset
SwitchToThread
CreateFileA
GetLastError
WideCharToMultiByte
lstrlenW
VirtualProtect
VirtualAlloc
lstrcatA
lstrcpyA
GetTempPathA
CreateDirectoryA
LoadLibraryA
GetProcAddress
GetComputerNameExW
Sleep
ExitProcess
CreateThread
HeapAlloc
HeapFree
GetProcessHeap
HeapReAlloc
WriteFile
CloseHandle
GetTickCount64
GetUserNameW
LookupAccountNameW
SHGetFolderPathA
DllGetClassObject
DllRegisterServer
PluginInit
RunObject
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE