Static task
static1
Behavioral task
behavioral1
Sample
015a0d0b474ac3f999517235644a38f402af28c53ae96f78e4e1ac961ebfdc91.dll
Resource
win7-20220715-en
General
-
Target
7805586150.zip
-
Size
606KB
-
MD5
acb934f01bc6204eafc2b759d49bae7e
-
SHA1
918244169b327060eeddfc29bd42e6f047becd0e
-
SHA256
439e9d8e210221339b83b10aadcf20407f39979fd1d837c575d9a0feb5d8aa38
-
SHA512
eba4577f241cf72adb8791ea396292c91e0eb531dcbfa78ae53156297f2d44eda3d1e27d6c630c0c747b83b728e08d421cfe1e6edeb99d77f81bad36b87bbc19
-
SSDEEP
12288:1lpgXU7poucjiXWWM59srcBCoJbbx/JU/+I4+OTd/uoIdoUy:97EtWM5EcDZJU2IOTdAdoUy
Malware Config
Signatures
Files
-
7805586150.zip.zip
Password: infected
-
015a0d0b474ac3f999517235644a38f402af28c53ae96f78e4e1ac961ebfdc91.dll windows x86
dc6a30db96f3aeca33bd244bd3c5c811
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
IsWinEventHookInstalled
gdi32
GetCharWidthA
msvcrt
memset
powrprof
ReadPwrScheme
kernel32
GetModuleHandleW
GetSystemDirectoryW
WaitForSingleObjectEx
OutputDebugStringA
CloseHandle
GetCalendarInfoW
DefineDosDeviceA
Sections
.text Size: 92KB - Virtual size: 90KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 572KB - Virtual size: 570KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 164KB - Virtual size: 176KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ