Static task
static1
Behavioral task
behavioral1
Sample
18ebcf91e97154a88bf7821a83a4a28ad402eb858511a74fd9e5925722f065a9.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
18ebcf91e97154a88bf7821a83a4a28ad402eb858511a74fd9e5925722f065a9.dll
Resource
win10v2004-20220901-en
General
-
Target
18ebcf91e97154a88bf7821a83a4a28ad402eb858511a74fd9e5925722f065a9
-
Size
210KB
-
MD5
f44ec1eac52b753373d2bc10af729d21
-
SHA1
edf380c1910fe096092caaefb5c5db8b29387d61
-
SHA256
18ebcf91e97154a88bf7821a83a4a28ad402eb858511a74fd9e5925722f065a9
-
SHA512
f50e197f731a5e950fdc2beae2a544a4918a05cb8ffd3abfedda5f746217f13ec3c38f61709e94e6c3c52e96b4d6a93d7980531cdda09eab5043fb588aa8e5ff
-
SSDEEP
3072:rTJztPmNhnIiaDCjqW9DKZr9+VwYddG+czMoKf:NxmL1aDMqQDK6Ce84
Malware Config
Signatures
Files
-
18ebcf91e97154a88bf7821a83a4a28ad402eb858511a74fd9e5925722f065a9.dll windows x86
5566fb1f6405a2b6cf03eae8e827918e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileW
lstrcatW
VirtualAllocEx
GetWindowsDirectoryW
user32
BeginPaint
UpdateWindow
ScrollWindow
SetScrollPos
SetScrollRange
ReleaseDC
GetDC
AppendMenuA
CallMsgFilterW
CascadeWindows
ChangeDisplaySettingsW
CharToOemA
CheckMenuItem
CloseDesktop
CopyAcceleratorTableA
CopyRect
CreateIconFromResourceEx
CreateMDIWindowA
DdeClientTransaction
DdeCreateStringHandleW
DdeFreeStringHandle
DdePostAdvise
DdeSetQualityOfService
DeregisterShellHookWindow
DrawStateW
EndDialog
EndMenu
EnumChildWindows
GetAltTabInfo
GetClassLongW
GetClipboardOwner
GetComboBoxInfo
GetInputState
EndPaint
GetMessageA
GetScrollPos
GetScrollRange
GetSubMenu
GetUpdateRect
GetWindowRgn
GetWindowThreadProcessId
IMPQueryIMEA
InSendMessageEx
InsertMenuItemA
IsCharUpperW
IsDialogMessageA
LoadKeyboardLayoutW
LockWorkStation
MoveWindow
OemToCharBuffW
RegisterClassExA
RegisterDeviceNotificationW
RemoveMenu
ScrollDC
SendDlgItemMessageA
SendMessageW
SendNotifyMessageW
SetDlgItemTextW
SetWindowWord
SystemParametersInfoW
TabbedTextOutA
TileWindows
ToAscii
TrackPopupMenuEx
TranslateMessage
UnhookWindowsHookEx
VkKeyScanA
VkKeyScanExA
WaitForInputIdle
WindowFromDC
PostQuitMessage
DefWindowProcA
LoadIconA
CreateWindowExA
GetKeyboardLayout
gdi32
TextOutA
GetTextMetricsA
advapi32
RegOpenKeyExA
Sections
.text Size: 203KB - Virtual size: 202KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ