Static task
static1
Behavioral task
behavioral1
Sample
0cb65dd401b0b565f181aa299ba42f723e45192f1b6e844fa663ffd26b07b5bc.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
0cb65dd401b0b565f181aa299ba42f723e45192f1b6e844fa663ffd26b07b5bc.dll
Resource
win10v2004-20220812-en
General
-
Target
0cb65dd401b0b565f181aa299ba42f723e45192f1b6e844fa663ffd26b07b5bc
-
Size
1.3MB
-
MD5
6110989143924c4b69260d534f34b12a
-
SHA1
97e6b36915dab37472e0c3b151c47169abf58605
-
SHA256
0cb65dd401b0b565f181aa299ba42f723e45192f1b6e844fa663ffd26b07b5bc
-
SHA512
476e60648901eb3d75590e92dd0381fd8c3061f530e7491596abadc206ac1d30fe8fe9b0331a3f7e52fd5134d6e2bdc8773b45dce368df54062a7d186cb8fdab
-
SSDEEP
24576:dwYCsmk07cGhathKvQwSrBaaz/VbE4n4EPO3+/nJerVXaM7PfiX:uYCsbXGhYIIpBaaLVbE44uO36OXa
Malware Config
Signatures
Files
-
0cb65dd401b0b565f181aa299ba42f723e45192f1b6e844fa663ffd26b07b5bc.dll windows x86
42115eed771ddcdb55e84676d697c5e2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comdlg32
GetFileTitleW
advapi32
GetServiceDisplayNameA
GetOldestEventLogRecord
GetServiceDisplayNameW
GetWindowsAccountDomainSid
GetEventLogInformation
GetSidIdentifierAuthority
EnumServicesStatusExW
GetSecurityDescriptorGroup
IsWellKnownSid
GetSecurityDescriptorOwner
oleaut32
GetErrorInfo
version
GetFileVersionInfoSizeW
gdi32
GetTextColor
GetTextMetricsA
GetLayout
GetDIBits
GetTextCharset
GetPixel
DescribePixelFormat
FloodFill
FlattenPath
GetTextAlign
winspool.drv
GetPrinterDriverA
DeletePrinterDriverW
GetPrinterDriverDirectoryW
GetPrintProcessorDirectoryW
FindFirstPrinterChangeNotification
secur32
GetComputerObjectNameW
ole32
GetConvertStg
kernel32
GetModuleFileNameA
GetBinaryTypeA
GetModuleHandleA
FindResourceA
GetThreadPriority
GetTimeZoneInformation
GetConsoleMode
GetStringTypeExW
ExitThread
FoldStringW
GetProcAddress
GetCurrencyFormatA
WriteProcessMemory
FlushFileBuffers
GetSystemWindowsDirectoryW
LockResource
GetProcessId
FindClose
GetCPInfo
FlushConsoleInputBuffer
lstrcmpA
LocalAlloc
GetSystemDirectoryA
GetComputerNameExW
GetSystemInfo
GetVolumePathNamesForVolumeNameW
GetComputerNameW
WriteProfileStringW
GetUserDefaultUILanguage
FillConsoleOutputCharacterA
GetLargestConsoleWindowSize
user32
GetMenuStringW
LoadIconA
DestroyCursor
LoadKeyboardLayoutW
GetRawInputDeviceInfoW
GetSysColor
FreeDDElParam
GetWindowWord
FillRect
GetMenuBarInfo
GetScrollBarInfo
EqualRect
GetKeyboardState
GetClipboardSequenceNumber
GetWindowThreadProcessId
GetMenuCheckMarkDimensions
LoadKeyboardLayoutA
GetUserObjectInformationW
DefFrameProcA
GetMenuItemInfoA
FindWindowW
DrawTextA
GetDlgItemInt
GetTabbedTextExtentA
GetWindowInfo
GetProcessWindowStation
DrawTextExW
msvcrt
ungetwc
strcoll
Sections
.text Size: 436KB - Virtual size: 432KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 652KB - Virtual size: 649KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 144KB - Virtual size: 144KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 64KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ