Static task
static1
Behavioral task
behavioral1
Sample
55020bc0b083ac1dfe4ad22fd43d01f68af79cf1209bb139c9aab876e2532b67.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
55020bc0b083ac1dfe4ad22fd43d01f68af79cf1209bb139c9aab876e2532b67.dll
Resource
win10v2004-20220901-en
General
-
Target
55020bc0b083ac1dfe4ad22fd43d01f68af79cf1209bb139c9aab876e2532b67
-
Size
183KB
-
MD5
79e00ae6f070307208fa9d35c16de76e
-
SHA1
b38353ffd5137cdda24280ad0f22c33036f2202c
-
SHA256
55020bc0b083ac1dfe4ad22fd43d01f68af79cf1209bb139c9aab876e2532b67
-
SHA512
47b94b56d59e499be818d0dcb7a41e60d846b3b52cc2ae99d561bbb9b306ae8b3848f5a8b11c6b42764f895a5db00ed552f08dbbaeaad5abe0712a77aacc0bf9
-
SSDEEP
3072:WbmIuWHsfQnCk+shyA3SGeTtdfaz6hdjUZC0GnydHAFlho4ycTN3Lbj:2H6shyueTSG7KEydMzFLb
Malware Config
Signatures
Files
-
55020bc0b083ac1dfe4ad22fd43d01f68af79cf1209bb139c9aab876e2532b67.dll windows x86
ad10e417a0d6b78d4f0ca5dfe765cad5
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
RegDeleteKeyW
RegCreateKeyExW
RegDeleteValueW
RegEnumKeyExW
RegSetValueExW
kernel32
GetWindowsDirectoryW
GetFileAttributesW
GetFileTime
GetHandleInformation
GetTickCount
HeapFree
HeapAlloc
CreateDirectoryW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
GetCommandLineA
GetProcessHeap
RtlUnwind
RaiseException
HeapReAlloc
ExitProcess
HeapSize
FreeLibrary
GetProcAddress
LoadLibraryA
LoadLibraryW
GetTickCount
GetTempPathA
ResetEvent
WaitForSingleObject
SetEvent
Sleep
ReadFile
GetFileInformationByHandle
CreateFileA
VirtualAlloc
VirtualFree
SetFilePointer
FindNextFileW
CreateDirectoryA
GetFileSize
FindNextFileA
FindFirstFileA
GetExitCodeThread
TerminateThread
DeleteFileW
GetDiskFreeSpaceExW
GetVersionExA
lstrlenA
GetLocaleInfoA
lstrcatA
GetLocalTime
SystemTimeToFileTime
lstrlenW
lstrcatW
lstrcpyW
SetFileAttributesA
GetFileAttributesA
CopyFileA
SetFileAttributesW
GetFileAttributesW
CopyFileW
GetVersion
SetThreadPriority
GetCurrentThread
CreateEventA
WaitForMultipleObjects
DeleteFileA
CreatePipe
GetSystemInfo
GetTimeZoneInformation
FileTimeToSystemTime
OutputDebugStringA
lstrcpyA
GetFullPathNameA
GetFullPathNameW
IsDBCSLeadByte
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
CreateThread
InterlockedExchange
GetDiskFreeSpaceExA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
CreateSemaphoreA
ReleaseSemaphore
ExitThread
WritePrivateProfileStringA
GetPrivateProfileStringA
FileTimeToLocalFileTime
lstrcmpA
lstrcmpW
GlobalFree
GlobalUnlock
GlobalAlloc
GetACP
GetTempFileNameA
GetUserDefaultLCID
SetPriorityClass
GetThreadPriority
GetPriorityClass
GetCurrentProcess
RtlUnwind
GetCurrentThreadId
TlsSetValue
GetSystemTime
HeapFree
HeapAlloc
GetCPInfo
GetOEMCP
GetCommandLineA
RaiseException
TlsAlloc
TlsFree
SetLastError
TlsGetValue
ExitProcess
TerminateProcess
HeapReAlloc
HeapSize
LCMapStringA
LCMapStringW
GetModuleHandleA
UnhandledExceptionFilter
GetEnvironmentVariableA
HeapDestroy
HeapCreate
IsBadWritePtr
GetStringTypeA
GetStringTypeW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetUnhandledExceptionFilter
IsBadCodePtr
shell32
ShellExecuteExW
ShellExecuteW
SHFileOperationW
SHGetFolderPathA
comdlg32
GetSaveFileNameW
GetOpenFileNameW
CommDlgExtendedError
comctl32
InitCommonControlsEx
ddraw
DirectDrawCreateEx
DirectDrawCreate
pdh
PdhGetFormattedCounterValue
PdhCollectQueryData
PdhAddCounterW
PdhMakeCounterPathW
PdhLookupPerfNameByIndexW
PdhCloseQuery
PdhOpenQueryW
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
winmm
timeGetDevCaps
timeEndPeriod
timeBeginPeriod
timeGetTime
crypt32
CertVerifyCertificateChainPolicy
setupapi
SetupIterateCabinetW
oleaut32
VariantInit
OleSavePictureFile
VarI4FromR4
SetErrorInfo
Sections
.text Size: 157KB - Virtual size: 157KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 302B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ