Static task
static1
Behavioral task
behavioral1
Sample
c246cdc666aa12e1c308e53841ea4f51972f9f2b99c26cf97e91f1d1b3572ceb.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c246cdc666aa12e1c308e53841ea4f51972f9f2b99c26cf97e91f1d1b3572ceb.dll
Resource
win10v2004-20220812-en
General
-
Target
c246cdc666aa12e1c308e53841ea4f51972f9f2b99c26cf97e91f1d1b3572ceb
-
Size
233KB
-
MD5
d316e4ebc51ebc0e11f6101ece2c81e4
-
SHA1
0eb9f7d6b8d1de574714ced7a736c31e390f9a77
-
SHA256
c246cdc666aa12e1c308e53841ea4f51972f9f2b99c26cf97e91f1d1b3572ceb
-
SHA512
82b4d7b7d5773d974cd5a6d08cdfb6dbd5f88a499a94aa2fe9a060a8c70b323f99d016b4ae27d0d08eeb0938e3cfa27d2f6f1e61c910019561ad61ed96dc9c1f
-
SSDEEP
6144:AX3/gc14bnDLiqx4HYkwoqjEgCCdGMUvvbC5oL:AX3/d14bnDeq0Y9VEgFd2nbC5oL
Malware Config
Signatures
Files
-
c246cdc666aa12e1c308e53841ea4f51972f9f2b99c26cf97e91f1d1b3572ceb.dll windows x86
5f43adca85b2d6bfe736cf146748e6f0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDiskFreeSpaceA
Sleep
lstrlenW
FindClose
GetSystemDefaultLangID
GetModuleHandleA
GetOEMCP
GetACP
VirtualQuery
GetCurrentThread
SetThreadLocale
IsBadReadPtr
GetStartupInfoA
LocalReAlloc
SetErrorMode
WideCharToMultiByte
HeapDestroy
WaitForSingleObject
GetProcAddress
WriteFile
ExitThread
LoadLibraryA
SizeofResource
GetStringTypeW
GetCommandLineA
EnterCriticalSection
ExitProcess
GetProcessHeap
GetCurrentThreadId
GetCommandLineW
DeleteFileA
LocalAlloc
lstrlenA
FindResourceA
GetVersionExA
GetModuleHandleW
GlobalFindAtomA
lstrcmpA
GetLastError
CreateThread
GetFileSize
VirtualAllocEx
GlobalDeleteAtom
IsBadHugeReadPtr
GlobalAddAtomA
GetTickCount
RaiseException
SetEvent
GetStringTypeA
GetLocaleInfoA
LockResource
SetLastError
GetUserDefaultLCID
EnumCalendarInfoA
HeapAlloc
lstrcatA
GetModuleFileNameA
ResetEvent
LoadLibraryExA
lstrcpynA
FormatMessageA
GlobalAlloc
shell32
Shell_NotifyIconA
SHFileOperationA
SHGetFileInfoA
SHGetDiskFreeSpaceA
DragQueryFileA
oleaut32
SysFreeString
SafeArrayCreate
shlwapi
SHDeleteKeyA
SHQueryInfoKeyA
PathGetCharTypeA
SHDeleteValueA
SHQueryValueExA
PathFileExistsA
SHStrDupA
msvcrt
atol
sin
memset
sqrt
fabs
user32
TrackPopupMenu
SetForegroundWindow
SetTimer
SetWindowLongA
SetParent
SetWindowsHookExA
SetClipboardData
SetCapture
ShowScrollBar
SetScrollRange
SetPropA
SetWindowPlacement
TranslateMessage
TranslateMDISysAccel
SetMenu
SetWindowPos
SetClassLongA
SetScrollInfo
SystemParametersInfoA
SetRect
SetMenuItemInfoA
SetCursor
SetWindowLongW
SetFocus
ShowWindow
SetWindowTextA
UnregisterClassA
SetScrollPos
ShowOwnedPopups
UnhookWindowsHookEx
Sections
.text Size: 53KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.fdata Size: 512B - Virtual size: 298B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.adata Size: 162KB - Virtual size: 281KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ddata Size: 1024B - Virtual size: 853B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 884B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ