Static task
static1
Behavioral task
behavioral1
Sample
45e769bc1b6e2e07deda22dad849ec6f0b33f7db52207693baa5ed43ac6a87ef.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
45e769bc1b6e2e07deda22dad849ec6f0b33f7db52207693baa5ed43ac6a87ef.dll
Resource
win10v2004-20220901-en
General
-
Target
45e769bc1b6e2e07deda22dad849ec6f0b33f7db52207693baa5ed43ac6a87ef
-
Size
67KB
-
MD5
152ac9d382f5576a9f07c1f1ccbc3917
-
SHA1
d7462a0db785eadea97186b4c4b6ae1ed8d74563
-
SHA256
45e769bc1b6e2e07deda22dad849ec6f0b33f7db52207693baa5ed43ac6a87ef
-
SHA512
4a82fc009c7f3243099de75bd6594a687d5a84a9195b926e70ae27e9e1050712f8df7d9b173b5a11dad3412017ecfdbb04975d39ba206492b4587f305c1f40e6
-
SSDEEP
768:6z2iT3yZtzp1fHAe5GYmXhNezzMkrrL9ktSsAi:WUtzfvh5ZmLCMMf9ktSsA
Malware Config
Signatures
Files
-
45e769bc1b6e2e07deda22dad849ec6f0b33f7db52207693baa5ed43ac6a87ef.dll windows x86
d2241303a2aa14b76d049099eefb0927
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTickCount
Sleep
HeapAlloc
GetProcessHeap
VirtualProtect
CloseHandle
WriteFile
SetFilePointer
CreateFileA
CompareStringA
IsBadReadPtr
GetCurrentProcess
OpenProcess
GetCurrentProcessId
GetLastError
CreateMutexA
OpenMutexA
LoadLibraryA
GetModuleHandleA
VirtualFreeEx
WaitForSingleObject
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
GetProcAddress
lstrlenA
CreateThread
DeleteFileA
ReadFile
GetFileSize
GetModuleFileNameA
GetSystemDirectoryA
FreeLibrary
user32
wsprintfA
GetWindowThreadProcessId
FindWindowA
SetTimer
KillTimer
TranslateMessage
DispatchMessageA
GetMessageA
GetDesktopWindow
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
wininet
InternetCloseHandle
InternetReadFile
InternetOpenUrlA
InternetOpenA
shlwapi
PathFileExistsA
Sections
.text Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ