Static task
static1
Behavioral task
behavioral1
Sample
ba5476a5a5575886a9f917b32e13b5d6c324cdf8130857f4252d96181979ef32.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ba5476a5a5575886a9f917b32e13b5d6c324cdf8130857f4252d96181979ef32.dll
Resource
win10v2004-20220901-en
General
-
Target
ba5476a5a5575886a9f917b32e13b5d6c324cdf8130857f4252d96181979ef32
-
Size
84KB
-
MD5
687d537b0dd04d248777dcecf7a03048
-
SHA1
157e461716ab28d6238a29ac5507567f721458a6
-
SHA256
ba5476a5a5575886a9f917b32e13b5d6c324cdf8130857f4252d96181979ef32
-
SHA512
4a8c336c3d3cdd1dfdb9e2a19241758be7a4f711d08c7c782aee3430d7b611359d51f3ad4c177025f30ea81afb5f30aff2561a6098d9dfa03efcc65e6ea999de
-
SSDEEP
768:JvMlfNb7uOLc/9a1SCwmVlMVvwxgE6NU2YtY5RLqtJ/N309I3+CkByWsluWBTheS:1W/uvIlWXaWRetEG+JyWsMwQI3L59Zz
Malware Config
Signatures
Files
-
ba5476a5a5575886a9f917b32e13b5d6c324cdf8130857f4252d96181979ef32.dll windows x86
704539dbe8c312b590f001a09641b277
Code Sign
35:e3:7e:fc:0e:fd:a2:ad:47:c0:31:bd:14:d2:39:d0Certificate
IssuerCN=Microsoft CorporationNot Before09-03-2009 04:34Not After31-12-2039 23:59SubjectCN=Microsoft Corporation9d:28:e9:2d:1b:a1:7b:cd:7a:78:51:f4:80:5e:45:68:4d:2f:02:57Signer
Actual PE Digest9d:28:e9:2d:1b:a1:7b:cd:7a:78:51:f4:80:5e:45:68:4d:2f:02:57Digest Algorithmsha1PE Digest MatchestrueSignature Validations
TrustedfalseVerification
Signing CertificateCN=Microsoft Corporation29-09-2022 19:04 Valid: false
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteFileW
SetFileAttributesW
CopyFileW
MoveFileW
GetSystemDirectoryW
GetTempPathW
FindResourceW
SizeofResource
LockResource
LoadResource
FindResourceExW
FreeLibrary
GetProcAddress
LoadLibraryW
GetVersionExW
MoveFileExW
LocalFree
LocalAlloc
GetLastError
GetModuleHandleExW
lstrlenW
GetModuleHandleW
CreateFileA
SetStdHandle
SetFilePointer
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
OpenMutexW
CloseHandle
MultiByteToWideChar
DisableThreadLibraryCalls
CreateThread
SetThreadPriority
TerminateThread
GetCurrentProcess
Sleep
FlushFileBuffers
GetConsoleMode
GetConsoleCP
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
LoadLibraryA
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
RtlUnwind
GetCurrentThreadId
GetCommandLineA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapCreate
VirtualFree
VirtualAlloc
ExitProcess
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
WriteFile
user32
CallNextHookEx
SendMessageW
GetDesktopWindow
SetWindowsHookExW
RegisterWindowMessageW
FindWindowW
UnhookWindowsHookEx
advapi32
RegQueryValueExW
RegCreateKeyExW
RegCloseKey
GetSidSubAuthorityCount
GetSidSubAuthority
OpenProcessToken
GetTokenInformation
RegSetValueExW
shell32
ShellExecuteW
ord680
ShellExecuteExW
ole32
StringFromGUID2
CoCreateGuid
oleaut32
SysFreeString
SysAllocStringLen
shlwapi
PathFileExistsW
PathRemoveFileSpecW
PathRemoveExtensionW
PathAddExtensionW
PathFindExtensionW
userenv
UnloadUserProfile
Exports
Exports
DllCanUnloadNow
DllGetAdvTimestamp
DllRunNonElevated
DllStopThread
Sections
.text Size: 55KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ad_share Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ