InteractiveDiskDatabase
Static task
static1
Behavioral task
behavioral1
Sample
d6dc7d435a8450c5f112f8745db046cc917edfbf2ad413fabe07c79ece3ebd72.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d6dc7d435a8450c5f112f8745db046cc917edfbf2ad413fabe07c79ece3ebd72.dll
Resource
win10v2004-20220812-en
General
-
Target
d6dc7d435a8450c5f112f8745db046cc917edfbf2ad413fabe07c79ece3ebd72
-
Size
98KB
-
MD5
09b8d6fdf951d160bd45c6c08caca470
-
SHA1
239358156e35f1aadc0ed04f15cd06f02ec7f005
-
SHA256
d6dc7d435a8450c5f112f8745db046cc917edfbf2ad413fabe07c79ece3ebd72
-
SHA512
3af3a53ff87446e5d37ee0dda9f9c5f8cb24b5e95fb3d9b7cbd9c78ada7f8304ef496773191480ad12a762f278a709ceb32d1fdecc1265197793572cf2e9f8f1
-
SSDEEP
1536:d19ifU1d+iIt8u5f07194xy2C2oKSAmmeTdmt8B9avx/gbGqNe2gEi/J:d19iM1dktZk4xVCjnDmeTAV5Y5eFEix
Malware Config
Signatures
Files
-
d6dc7d435a8450c5f112f8745db046cc917edfbf2ad413fabe07c79ece3ebd72.dll windows x86
7f7de809ed7f5db0ae8a6a8bf07a9ad5
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetQueueStatus
kernel32
CreateMutexW
LoadLibraryA
GetDriveTypeA
WriteConsoleW
GetDriveTypeA
GetStartupInfoA
QueryDosDeviceW
GlobalDeleteAtom
CreateNamedPipeW
GetEnvironmentStrings
CallNamedPipeA
WritePrivateProfileStructW
GlobalAddAtomA
BackupWrite
GetProfileIntW
GetSystemInfo
SetConsoleTextAttribute
HeapUnlock
SetConsoleMode
CopyFileW
VirtualQuery
GetFileAttributesA
DisableThreadLibraryCalls
GetCurrencyFormatA
GetLogicalDriveStringsW
EscapeCommFunction
SetLocalTime
DeleteAtom
SetFileTime
LocalHandle
RaiseException
SetDefaultCommConfigW
TerminateProcess
GetConsoleWindow
DeleteVolumeMountPointW
ReleaseMutex
GlobalMemoryStatus
WritePrivateProfileSectionA
GetSystemDirectoryW
FindResourceExW
GetProcAddress
ReplaceFileA
SetupComm
GetPrivateProfileSectionW
DebugActiveProcess
VirtualProtect
SetLocaleInfoW
GetWindowsDirectoryA
GetTimeFormatA
VirtualAlloc
EnumSystemLanguageGroupsA
GetTickCount
LocalAlloc
LocalFree
FreeLibrary
InterlockedExchange
GetLastError
Exports
Exports
Sections
.text Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 66KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.hdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ