CreateObj
Static task
static1
Behavioral task
behavioral1
Sample
f4c6a023a046558be3f9945c2127d2d6c7d2af39b210764ff556ff0393e49798.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f4c6a023a046558be3f9945c2127d2d6c7d2af39b210764ff556ff0393e49798.dll
Resource
win10v2004-20220901-en
General
-
Target
f4c6a023a046558be3f9945c2127d2d6c7d2af39b210764ff556ff0393e49798
-
Size
304KB
-
MD5
06dfa23264214c1d34d9a65533fba970
-
SHA1
2c0481e9e2e53c6049298923e2a78962dd66e819
-
SHA256
f4c6a023a046558be3f9945c2127d2d6c7d2af39b210764ff556ff0393e49798
-
SHA512
34315403b6eb54463783e3c938034e6a869c88c912ff41e2f135942bdabe00f53ff9beb3db4c52bef71ef107866b6a0fbf6a04351577198f25c4f0dea88ba64b
-
SSDEEP
6144:mD+vaKJ3ZCdDw+CQgcM6v9RjZlx4zHfjMk/bvW/u/jCCEbQ9:mD+v/JpaBCQgc7HdliDjTTB/jEbK
Malware Config
Signatures
Files
-
f4c6a023a046558be3f9945c2127d2d6c7d2af39b210764ff556ff0393e49798.dll windows x86
06227fb4e6e4c275bd3ac2299966dd15
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcessId
CreateToolhelp32Snapshot
Thread32First
Thread32Next
OpenThread
SuspendThread
SetThreadContext
ResumeThread
LoadLibraryA
GetProcAddress
FreeLibrary
CreateFileMappingA
RtlMoveMemory
OpenProcess
VirtualFreeEx
GetProcessHeap
GetModuleHandleA
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
IsBadReadPtr
GetPrivateProfileStringA
WritePrivateProfileStringA
GetTickCount
LCMapStringA
user32
wsprintfA
MessageBoxA
GetWindowThreadProcessId
GetClassNameA
GetWindowTextA
EnumThreadWindows
FindWindowA
msvcrt
_ftol
__CxxFrameHandler
malloc
free
memmove
modf
strchr
sprintf
??3@YAXPAX@Z
??2@YAPAXI@Z
atoi
_strnicmp
_CIfmod
strncmp
srand
rand
Exports
Exports
Sections
.text Size: 36KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: 244KB - Virtual size: 242KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 972B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ