Static task
static1
Behavioral task
behavioral1
Sample
84bdc09207f6fb4143334ac761cd8975aff92f521ba733fe4a389479133e89cc.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
84bdc09207f6fb4143334ac761cd8975aff92f521ba733fe4a389479133e89cc.dll
Resource
win10v2004-20220901-en
General
-
Target
84bdc09207f6fb4143334ac761cd8975aff92f521ba733fe4a389479133e89cc
-
Size
132KB
-
MD5
6e897dd865d3557581713640314bd0f5
-
SHA1
aa6e65aa28beeb32e1fabfd5b3eb5291dfd0a7e7
-
SHA256
84bdc09207f6fb4143334ac761cd8975aff92f521ba733fe4a389479133e89cc
-
SHA512
7e94dd06c6ef0cd9fa3b0f0d8cf60153c162fdf2a484632287afc0b6e5acb3dfd2c5bd33a15baf18d8b703ceca971bce0ecb44ce4a8ed75709c349ceead08065
-
SSDEEP
3072:wMLYDWkLRanCERnqjp4lmaD5XfWNXBp3rq19n9GE:lY6uanCmop2+xle1
Malware Config
Signatures
Files
-
84bdc09207f6fb4143334ac761cd8975aff92f521ba733fe4a389479133e89cc.dll windows x86
4b8abd9b2dd87b0591cf000853d22927
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalAlloc
GetDriveTypeW
lstrlenW
GetCurrentProcess
GetProcAddress
OpenProcess
UnhandledExceptionFilter
GetProcessHeap
InterlockedIncrement
MultiByteToWideChar
GetACP
ExitProcess
HeapDestroy
SetHandleCount
GetFileType
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
WriteFile
InterlockedCompareExchange
Sleep
InterlockedExchange
LocalFree
GetLocaleInfoA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
HeapSize
GetCPInfo
GetOEMCP
GetLastError
GetStartupInfoA
GetModuleHandleA
VirtualQuery
GetSystemInfo
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
RtlUnwind
HeapFree
HeapAlloc
WideCharToMultiByte
GetVersionExA
LoadLibraryW
SetUnhandledExceptionFilter
TerminateProcess
FreeLibrary
WaitForSingleObject
LocalReAlloc
LoadLibraryA
CloseHandle
GetVersionExW
GetCommandLineA
VirtualProtect
user32
DestroyWindow
IsWindow
SetWindowPos
GetClientRect
EndDialog
FrameRect
DrawFocusRect
InflateRect
DrawEdge
OffsetRect
GetSysColor
FillRect
GetSysColorBrush
EnableWindow
IsDlgButtonChecked
SetDlgItemInt
SetFocus
ExitWindowsEx
GetDlgItemInt
GetWindowRect
ShowWindow
GetWindowTextA
GetFocus
MapWindowPoints
ReleaseDC
GetDC
GetWindowThreadProcessId
IsWindowVisible
SetDlgItemTextA
GetDlgItemTextA
GetDlgItem
MessageBeep
CheckDlgButton
advapi32
AdjustTokenPrivileges
OpenProcessToken
LookupPrivilegeValueW
RegCloseKey
gdi32
SelectObject
SetBkMode
SetTextColor
CreateSolidBrush
DeleteObject
Rectangle
SetROP2
SetBkColor
Sections
.text Size: 64KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 40KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ