ycdb
Static task
static1
Behavioral task
behavioral1
Sample
7b898b334ea97e0b19609aa3ff823664a4767f0fabd62511bfd2e4d942317d52.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7b898b334ea97e0b19609aa3ff823664a4767f0fabd62511bfd2e4d942317d52.dll
Resource
win10v2004-20220901-en
General
-
Target
7b898b334ea97e0b19609aa3ff823664a4767f0fabd62511bfd2e4d942317d52
-
Size
88KB
-
MD5
5e7cb3acc69302f47729bef9a5abd383
-
SHA1
57c326c4c7ee3c0309f2087b945a732e451e7465
-
SHA256
7b898b334ea97e0b19609aa3ff823664a4767f0fabd62511bfd2e4d942317d52
-
SHA512
2ace063187604a699c3681048f58b1be1b064663ad90b97329eff19d4331baed72ac7a1f6d43cc1fa35b7926f7621f442568643178557c62db2c6dc1715844e8
-
SSDEEP
1536:BF61x+8G2iFYz7rX2Y3Jx1F6sXV2u8cywDSCfF/JuTIaYsc96J:BFA+8fiFYjX2S/1os+cyyfhcTIXDsJ
Malware Config
Signatures
Files
-
7b898b334ea97e0b19609aa3ff823664a4767f0fabd62511bfd2e4d942317d52.dll windows x86
e6e00f4c0d58cc356384192ab7a38e0a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStringTypeA
lstrlenW
LCMapStringA
CreateFileA
UnmapViewOfFile
WaitForSingleObject
LocalFree
IsDBCSLeadByte
DeleteFileA
VirtualProtect
CreateMutexA
VirtualAlloc
GetStringTypeW
MultiByteToWideChar
HeapDestroy
SetFileTime
TlsAlloc
WriteFile
CreateFileW
SetHandleCount
CreateFileMappingW
MapViewOfFile
FreeEnvironmentStringsW
DisableThreadLibraryCalls
GetTickCount
GetStartupInfoA
GetSystemTimeAsFileTime
Sleep
OpenFileMappingA
VirtualFree
InitializeCriticalSectionAndSpinCount
GetFileSize
CloseHandle
HeapCreate
GetFullPathNameW
TerminateProcess
GetACP
GetStringTypeExA
QueryPerformanceCounter
DeleteFileW
lstrcmpA
InterlockedDecrement
HeapFree
FlushViewOfFile
WideCharToMultiByte
CreateMutexW
MoveFileA
GetEnvironmentVariableA
VirtualQuery
UnhandledExceptionFilter
HeapReAlloc
GetCurrentProcess
GetDiskFreeSpaceW
GetVersionExA
GetLastError
GetStdHandle
InitializeCriticalSection
InterlockedIncrement
GetFullPathNameA
OpenFileMappingW
TlsFree
GetCPInfo
GetSystemInfo
TlsGetValue
GetCurrentProcessId
ReleaseMutex
GetCurrentThreadId
GetProcAddress
FreeEnvironmentStringsA
GetLocaleInfoA
MoveFileW
IsBadReadPtr
SetFilePointer
GetEnvironmentStrings
LeaveCriticalSection
GetOEMCP
HeapAlloc
lstrlenA
CreateFileMappingA
GetFileType
SetUnhandledExceptionFilter
GetEnvironmentStringsW
GetDiskFreeSpaceA
InterlockedExchange
DeleteCriticalSection
lstrcmpiA
CreateThread
EnterCriticalSection
CompareFileTime
SetEvent
SetEndOfFile
LocalAlloc
FreeLibrary
LoadLibraryA
CreateEventA
SetLastError
MoveFileWithProgressA
Exports
Exports
Sections
.text Size: 44KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 582B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ