OnTimer
Static task
static1
Behavioral task
behavioral1
Sample
6d5210648a3794fc6fb778a8a728ea6ccde58b9055d9602590caa06788349802.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6d5210648a3794fc6fb778a8a728ea6ccde58b9055d9602590caa06788349802.dll
Resource
win10v2004-20220812-en
General
-
Target
6d5210648a3794fc6fb778a8a728ea6ccde58b9055d9602590caa06788349802
-
Size
48KB
-
MD5
67dc9556f435a910fad45e315a2b1f42
-
SHA1
4f5e808df325fe110f5a7db408631bcc211ecf69
-
SHA256
6d5210648a3794fc6fb778a8a728ea6ccde58b9055d9602590caa06788349802
-
SHA512
44fffc892e0bc3bda89ca494b98f21db1b4ac0f1e3906a5b575f5b6196ce6fbded1be55e793b308f1cc2cf1a758fa31e96ec9452907a9c5911a482e6c6f14ae7
-
SSDEEP
768:ErM4DOpmWDxE6FaDq6xu4O+59ZMySSXo9888:kDOpmWDm6cDqmu4znZjboe5
Malware Config
Signatures
Files
-
6d5210648a3794fc6fb778a8a728ea6ccde58b9055d9602590caa06788349802.dll windows x86
9de9db43ee2798fc4ff283d8b196fab6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcmpiA
GetProcAddress
LoadLibraryA
GetTickCount
FindResourceA
VirtualAlloc
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
GetOEMCP
VirtualFree
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
HeapDestroy
HeapCreate
HeapFree
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
WriteFile
HeapAlloc
HeapReAlloc
GetCPInfo
GetACP
RtlUnwind
user32
FindWindowA
GetDC
GetSystemMetrics
shlwapi
StrRChrA
advapi32
RegOpenKeyExA
Exports
Exports
Sections
.text Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ