Static task
static1
Behavioral task
behavioral1
Sample
029bb375fb2e0a09bd14f3ea87b35a86eaccadd7e18ac7f033080ff4ec21372b.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
029bb375fb2e0a09bd14f3ea87b35a86eaccadd7e18ac7f033080ff4ec21372b.dll
Resource
win10v2004-20220812-en
General
-
Target
029bb375fb2e0a09bd14f3ea87b35a86eaccadd7e18ac7f033080ff4ec21372b
-
Size
176KB
-
MD5
6bf26b9409836d5e3b92ee778f48ec4f
-
SHA1
0a53ea687807f60460cba56f9c110bb7c0b2a9c8
-
SHA256
029bb375fb2e0a09bd14f3ea87b35a86eaccadd7e18ac7f033080ff4ec21372b
-
SHA512
488dee56d6eb4d1b2ebfcb1f5d4d1cf36f1204e5236d7c3310696df026abb73b2a476f6201a485823185c5fb78b3f79db018df150ff7ed8ad6f26651c4f7b860
-
SSDEEP
3072:Vc+wIc5kO5EgN7c03W3alontkTyui/+UPQgco7hmaP5qqrIQYYyx:V+I8vY6LoGW+0x3IQTyx
Malware Config
Signatures
Files
-
029bb375fb2e0a09bd14f3ea87b35a86eaccadd7e18ac7f033080ff4ec21372b.dll windows x86
e4cfce3398ba4e2d3316e58c5c62a93b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SystemParametersInfoA
GetWindowTextA
GetCursorPos
DispatchMessageW
CreateMenu
RegisterClassA
DrawTextA
GetScrollInfo
SetWindowLongA
CreateIcon
GetMenu
GetSubMenu
IsWindowVisible
GetClipboardData
GetScrollPos
GetMenuState
GetMenuItemCount
DispatchMessageA
DeferWindowPos
IsWindowEnabled
GetCapture
DrawFrameControl
DefMDIChildProcA
GetPropA
GetIconInfo
GetSysColor
DrawIcon
EndDeferWindowPos
BeginDeferWindowPos
DefFrameProcA
GetMenuStringA
GetCursor
FrameRect
IsDialogMessageA
GetClassInfoA
ShowWindow
GetMessagePos
GetForegroundWindow
FillRect
GetDlgItem
SetCursor
SetTimer
DrawMenuBar
GetClassLongA
EnableWindow
GetMenuItemID
IsMenu
EnableMenuItem
CharNextA
EnumChildWindows
GetParent
CreatePopupMenu
GetWindow
GetFocus
GetDCEx
kernel32
GetStringTypeW
GetFileAttributesA
HeapDestroy
EnumCalendarInfoA
SetErrorMode
GlobalAlloc
GetVersionExA
SizeofResource
FindClose
LocalAlloc
GetProcAddress
DeleteFileA
GetOEMCP
MoveFileExA
GetDiskFreeSpaceA
LoadLibraryA
GetCPInfo
Sleep
lstrcpynA
lstrcpyA
GetFileSize
LoadLibraryExA
GetLocaleInfoA
ExitProcess
FreeResource
SetLastError
CreateEventA
VirtualAlloc
CreateFileA
lstrcatA
EnterCriticalSection
GetCurrentThreadId
lstrcmpiA
VirtualAllocEx
GetSystemDefaultLangID
FindResourceA
GetStartupInfoA
GetCurrentThread
GetLocalTime
GetCurrentProcessId
FindFirstFileA
ResetEvent
GetProcessHeap
msvcrt
_itow
_commit
wcsncmp
wcstol
memmove
exit
_wfopen
memcpy
__set_app_type
srand
Sections
.init Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
BSS Size: 3KB - Virtual size: 186KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
DATA Size: 162KB - Virtual size: 161KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 512B - Virtual size: 155B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 130B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ