Static task
static1
Behavioral task
behavioral1
Sample
aa4e40fdf64740de2d4bdd74d8259f6b03f5353eacf826889d28e80bc075479a.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
aa4e40fdf64740de2d4bdd74d8259f6b03f5353eacf826889d28e80bc075479a.dll
Resource
win10v2004-20220812-en
General
-
Target
aa4e40fdf64740de2d4bdd74d8259f6b03f5353eacf826889d28e80bc075479a
-
Size
303KB
-
MD5
67c814496f0d18a28f2537efe864b106
-
SHA1
6352301608f97bf3a7f2e68d6aae7e185f1b56b8
-
SHA256
aa4e40fdf64740de2d4bdd74d8259f6b03f5353eacf826889d28e80bc075479a
-
SHA512
773ec5535618122af0f018c84578cd1714aa8ec6c776e41a00d35acbc48233c3517762237daac55d61105d842082acc737d0f73bf7083c14447bb2ce5648aae3
-
SSDEEP
6144:I6MMYx5EOhcoh//oct0pf1XB9FVTqmCYkk3jmsy6LBAOieSqs:I3bhcoRAct0prFTHpTisHr0q
Malware Config
Signatures
Files
-
aa4e40fdf64740de2d4bdd74d8259f6b03f5353eacf826889d28e80bc075479a.dll windows x86
a54565fd03aff54df94deececbe2273e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
user32
InflateRect
ShowWindow
GetMenu
FillRect
GetFocus
OemToCharA
SetWindowLongW
DrawEdge
MapVirtualKeyA
CreatePopupMenu
GetCursor
UnregisterClassA
SetClipboardData
GetDlgItem
IsWindowUnicode
EnableMenuItem
IsWindow
SetFocus
GetActiveWindow
CloseClipboard
InsertMenuItemA
PostMessageA
GetScrollRange
SendMessageA
GetSystemMetrics
GetKeyboardState
DefFrameProcA
EnableScrollBar
DestroyWindow
SetCursor
MessageBeep
GetCursorPos
ReleaseDC
DrawFrameControl
GetParent
PeekMessageA
GetCapture
GetLastActivePopup
GetDC
GetForegroundWindow
SetTimer
SetWindowTextA
TrackPopupMenu
PtInRect
IsWindowEnabled
GetClassInfoA
GetClipboardData
SetForegroundWindow
GetSubMenu
CharToOemA
IsIconic
GetKeyState
EmptyClipboard
UnhookWindowsHookEx
RemoveMenu
SetClassLongA
TranslateMessage
GetDCEx
DestroyMenu
FindWindowA
GetMessagePos
DefMDIChildProcA
KillTimer
GetKeyboardLayoutList
LoadBitmapA
CreateWindowExA
SetScrollInfo
GetMenuItemID
CharNextA
ScreenToClient
SetScrollRange
gdi32
GetDIBColorTable
CreatePalette
kernel32
GetCommandLineW
VirtualAllocEx
GlobalAlloc
lstrlenA
lstrlenW
LoadLibraryA
GetCommandLineA
ExitProcess
ExitThread
GetACP
GetProcAddress
IsBadReadPtr
GetModuleHandleA
comdlg32
FindTextA
shlwapi
PathIsContentTypeA
SHDeleteValueA
SHQueryInfoKeyA
oleaut32
SafeArrayPtrOfIndex
ole32
CoTaskMemFree
StgCreateDocfileOnILockBytes
CoCreateFreeThreadedMarshaler
CLSIDFromProgID
CoGetContextToken
StgOpenStorage
shell32
Shell_NotifyIconA
SHGetSpecialFolderLocation
advapi32
RegDeleteValueA
RegLoadKeyA
Sections
CODE Size: 101KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 184KB - Virtual size: 184KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.RSRC1 Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.RSRC6 Size: 1024B - Virtual size: 582B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.RSRC2 Size: 1KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.RSRC8 Size: 1024B - Virtual size: 943B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.RSRC5 Size: 1024B - Virtual size: 769B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.RSRC4 Size: 512B - Virtual size: 356B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 596B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ