Static task
static1
Behavioral task
behavioral1
Sample
c1aa2022abd0a43dd493a3216374b0a4f5d4f147638977426bf848ea98bfcc88.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c1aa2022abd0a43dd493a3216374b0a4f5d4f147638977426bf848ea98bfcc88.dll
Resource
win10v2004-20220901-en
General
-
Target
c1aa2022abd0a43dd493a3216374b0a4f5d4f147638977426bf848ea98bfcc88
-
Size
219KB
-
MD5
eeaa67c7a4eb5630a04dfe9b3718a114
-
SHA1
38d04278d5b34b5c636c783cc838472ae868ab27
-
SHA256
c1aa2022abd0a43dd493a3216374b0a4f5d4f147638977426bf848ea98bfcc88
-
SHA512
73df9bd35b39a6714e49a88fad66e9a70c40a692ff95f69f87a749e0488ba7067f345ca9b78dd4a01ca55d960ee6c3b6445aab04e461f5ecd43b5de7d64f2918
-
SSDEEP
6144:PXtcMTJusAekFQ13IycnXYRiUkjpSyES:vafpQ13IyoYRiUsMy
Malware Config
Signatures
Files
-
c1aa2022abd0a43dd493a3216374b0a4f5d4f147638977426bf848ea98bfcc88.dll windows x86
8ec8262af04d1e00a15c79205d2983ed
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegLoadKeyA
comctl32
ImageList_DragShowNolock
ImageList_Add
ImageList_GetBkColor
ImageList_Read
ImageList_Draw
ImageList_Remove
ImageList_Write
ImageList_Destroy
ImageList_DrawEx
comdlg32
GetOpenFileNameA
ChooseColorA
GetSaveFileNameA
FindTextA
ntdll
NtWaitForSingleObject
kernel32
GetEnvironmentStrings
GetStdHandle
VirtualFree
LocalReAlloc
GetProcAddress
ReadFile
GetDiskFreeSpaceA
GetStringTypeA
EnumCalendarInfoA
VirtualAllocEx
LocalAlloc
WriteFile
GetModuleHandleA
MulDiv
GetACP
HeapFree
FindClose
SetFilePointer
LockResource
SetThreadLocale
GetCurrentThreadId
GetVersion
MoveFileExA
HeapDestroy
RaiseException
WaitForSingleObject
VirtualQuery
SetEvent
lstrcpyA
FindFirstFileA
LoadResource
GetLocalTime
GetThreadLocale
WideCharToMultiByte
lstrcmpiA
VirtualAlloc
GetDateFormatA
LocalFree
GlobalDeleteAtom
GetLocaleInfoA
lstrcatA
SetErrorMode
ExitThread
GetLastError
GetCurrentProcess
GetFullPathNameA
HeapAlloc
GetUserDefaultLCID
FindResourceA
GetFileSize
GetCurrentProcessId
GlobalFindAtomA
GetCPInfo
SetEndOfFile
GetModuleFileNameA
GetStartupInfoA
GetTickCount
SizeofResource
LoadLibraryExA
GetFileAttributesA
SetHandleCount
GetVersionExA
ResetEvent
GetOEMCP
lstrcmpA
EnterCriticalSection
LoadLibraryA
lstrlenA
GetCommandLineA
DeleteCriticalSection
FreeResource
SetLastError
GetSystemDefaultLangID
CloseHandle
Sleep
GlobalAlloc
FormatMessageA
GlobalAddAtomA
CompareStringA
ExitProcess
InitializeCriticalSection
GetFileType
CreateFileA
lstrcpynA
MoveFileA
user32
DispatchMessageA
FillRect
SetWindowTextA
DispatchMessageW
GetActiveWindow
DefFrameProcA
GetScrollInfo
GetCursorPos
GetDCEx
IsChild
FindWindowA
SetWindowPos
GetWindowTextA
GetMenuItemID
DefWindowProcA
IsWindowEnabled
EndDeferWindowPos
DrawTextA
IsMenu
GetKeyNameTextA
GetParent
RegisterClassA
CharNextA
GetScrollRange
CreateWindowExA
GetClassLongA
SetWindowLongA
SystemParametersInfoA
EnableMenuItem
GetDC
DrawFrameControl
GetClientRect
DefMDIChildProcA
EnumThreadWindows
CreateIcon
GetWindow
GetMenuState
EnumChildWindows
CreatePopupMenu
GetSysColorBrush
EnableWindow
GetMenuStringA
GetCursor
EqualRect
GetDlgItem
GetClassInfoA
GetMenu
CharLowerBuffA
CharToOemA
GetFocus
EnableScrollBar
BeginPaint
EnumWindows
ClientToScreen
GetClipboardData
BeginDeferWindowPos
GetKeyState
GetDesktopWindow
MessageBoxA
HideCaret
GetSysColor
IsWindowVisible
GetScrollPos
GetCapture
GetMenuItemCount
DrawEdge
CreateMenu
ShowWindow
CheckMenuItem
SetCursor
GetLastActivePopup
GetMenuItemInfoA
DrawIcon
GetPropA
CallNextHookEx
msvcrt
log
memmove
sqrt
abs
clock
strlen
exp
pow
malloc
ceil
memcpy
strncmp
calloc
wcsncmp
swprintf
atol
wcschr
version
VerFindFileA
Sections
.text Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 168KB - Virtual size: 263KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 1024B - Virtual size: 613B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ