Static task
static1
Behavioral task
behavioral1
Sample
youWhen.dll
Resource
win7-20220901-en
General
-
Target
youWhen.db.zip
-
Size
322KB
-
MD5
164f69fb7e43cab770b36864a818d180
-
SHA1
2ea800dca49970da661bda9e1d8d63c93a00b3d8
-
SHA256
d413a1433725e6ef4572bf2bc66ff86472f7f8cd47e91cf69f65962737f50529
-
SHA512
e220992ee29c3ce85c1288e81d9a3587d5432a93ac2de652af5fe8c92e046472ed19ba9a92b4c3c8f88fe8c37aa1e51ef9324692f26ddc15a29ab1108062368b
-
SSDEEP
6144:91JA49T1rqUMICneR8qg/Uu9T2U1TCK1cbYheZSwhgGln35ZKGyyQNIx864i:91J5T1rqUyTDvR9cbYuhjl3LVyLN086/
Malware Config
Signatures
Files
-
youWhen.db.zip.zip
Password: infected
-
youWhen.db.dll windows x86
d2632f6acb821134ed92e8078dc06717
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
winspool.drv
GetPrinterDataExW
DeletePrinterConnectionW
gdi32
FloodFill
GetObjectA
GetDeviceGammaRamp
GetWindowOrgEx
ModifyWorldTransform
GetPixel
GetCurrentPositionEx
GetTextExtentExPointW
GetBrushOrgEx
shell32
FindExecutableW
ExtractIconW
user32
LoadAcceleratorsA
GetWindowTextA
DefFrameProcW
GetUserObjectInformationA
GetKeyboardLayout
GetKeyNameTextA
GetQueueStatus
LoadBitmapA
DestroyIcon
EqualRect
FindWindowW
DrawFrameControl
IsWindowVisible
msvcrt
toupper
_time64
strcoll
oleaut32
LHashValOfNameSysA
advapi32
LookupAccountSidW
GetOldestEventLogRecord
GetSecurityDescriptorOwner
EnumServicesStatusW
RegOpenKeyA
kernel32
GetNLSVersion
OutputDebugStringA
GetCompressedFileSizeW
GetTapePosition
GetLastError
GetQueuedCompletionStatus
WaitForSingleObjectEx
GetSystemDefaultUILanguage
EnumSystemLocalesA
GetExitCodeProcess
lstrcmpA
GetUserDefaultLCID
GetPrivateProfileIntA
VirtualAlloc
GetLogicalDriveStringsA
IsValidCodePage
GetSystemWindowsDirectoryA
GetDefaultCommConfigA
LockResource
DeleteCriticalSection
GetModuleHandleW
GetCurrentConsoleFont
GetModuleFileNameW
GetBinaryTypeW
GlobalFree
GetCommandLineA
FindNextVolumeMountPointW
GetCurrentDirectoryA
Sections
.text Size: 128KB - Virtual size: 127KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 296KB - Virtual size: 292KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 72KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 76KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ