CreateInterface
Static task
static1
Behavioral task
behavioral1
Sample
605c5029a2f469ffeffd0af0a521b0dccf461ab934f99c8f87503e5812246350.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
605c5029a2f469ffeffd0af0a521b0dccf461ab934f99c8f87503e5812246350.dll
Resource
win10v2004-20220901-en
General
-
Target
605c5029a2f469ffeffd0af0a521b0dccf461ab934f99c8f87503e5812246350
-
Size
540KB
-
MD5
5f4599dcb2d4760d7b5f4ac60f1f4053
-
SHA1
3ba73ab5353d47da133381686db7edbaac5a3858
-
SHA256
605c5029a2f469ffeffd0af0a521b0dccf461ab934f99c8f87503e5812246350
-
SHA512
87a075098d9ac25631015937c09b8e9e49f9472b720196534836ecc68b66dd9e4904b2c03a0121906c3633ec5fce9b9d5e035b3a5b283f1703b8bafb1fa17ed6
-
SSDEEP
12288:UxZkGA9m5AP4QmldXUGYv7Png4LWbG0GbYjRg2UVsAarPoV5U1Im3pHQCaOOft:Uv5AP4QmlGgy+GbYjRxUS9LoVk9Iht
Malware Config
Signatures
Files
-
605c5029a2f469ffeffd0af0a521b0dccf461ab934f99c8f87503e5812246350.dll windows x86
23801ab2f6210a5b90bbf89fedb16451
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcess
LeaveCriticalSection
OutputDebugStringA
EnterCriticalSection
InitializeCriticalSection
GetEnvironmentVariableA
GetModuleFileNameA
TerminateProcess
VirtualQuery
HeapAlloc
GetProcessHeap
FindNextFileA
FindClose
FindFirstFileA
SetConsoleTextAttribute
GetStdHandle
GetModuleHandleA
GetConsoleScreenBufferInfo
GetNumberOfConsoleInputEvents
PeekConsoleInputA
GetConsoleMode
SetConsoleMode
ReadConsoleInputA
GetLocaleInfoW
SetConsoleCtrlHandler
SetEndOfFile
IsBadCodePtr
IsBadWritePtr
IsBadReadPtr
SetUnhandledExceptionFilter
RaiseException
CreateFileA
SetStdHandle
MultiByteToWideChar
WideCharToMultiByte
GetProcAddress
LoadLibraryA
FreeLibrary
GetDriveTypeA
GetCurrentDirectoryA
GetFullPathNameA
GetLastError
CreateDirectoryA
FileTimeToSystemTime
FileTimeToLocalFileTime
GetFileAttributesA
SetEnvironmentVariableA
SetCurrentDirectoryA
GetCurrentThreadId
GetCommandLineA
GetVersionExA
RtlUnwind
ExitProcess
DeleteCriticalSection
FatalAppExitA
TlsAlloc
SetLastError
GetCurrentThread
TlsFree
TlsSetValue
TlsGetValue
SetHandleCount
GetFileType
GetStartupInfoA
SetEnvironmentVariableW
CloseHandle
ReadFile
SetFilePointer
VirtualProtect
VirtualAlloc
GetSystemInfo
GetACP
GetOEMCP
GetCPInfo
WriteFile
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
UnhandledExceptionFilter
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringA
LCMapStringW
InterlockedExchange
GetStringTypeA
GetStringTypeW
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
GetTimeZoneInformation
FlushFileBuffers
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
CompareStringA
CompareStringW
WriteConsoleA
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
tier0
?DevMsg@@YAXPBDZZ
DevMsg
_AssertValidReadPtr
_AssertValidWritePtr
AssertValidStringPtr
MemAllocScratch
MemFreeScratch
CommandLine_Tier0
Warning
Error
SpewOutputFunc
g_pMemAlloc
Msg
GetCPUInformation
vstdlib
KeyValuesSystem
Exports
Exports
Sections
.text Size: 276KB - Virtual size: 274KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 113KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text Size: 196KB - Virtual size: 196KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE