Static task
static1
Behavioral task
behavioral1
Sample
fe4f537e7ae4b9e4300c38ffdf1144ebe115d9bb9c7aabd58934260e8551ce98.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fe4f537e7ae4b9e4300c38ffdf1144ebe115d9bb9c7aabd58934260e8551ce98.dll
Resource
win10v2004-20220812-en
General
-
Target
fe4f537e7ae4b9e4300c38ffdf1144ebe115d9bb9c7aabd58934260e8551ce98
-
Size
72KB
-
MD5
6019d09ebdfeb2b6ecd000711f6e0620
-
SHA1
9cc3c81d79e263b707d037b7083a9f3a73658528
-
SHA256
fe4f537e7ae4b9e4300c38ffdf1144ebe115d9bb9c7aabd58934260e8551ce98
-
SHA512
1dbf73b4ba9523305d734f2e648fd2dc002a8c32c6bb59bc70dacf4a9f358fe133520bd95222789317282c88e85c9fdd9154693a5881f3cbaa539c23756d767a
-
SSDEEP
1536:1EyviWXCWltLHHBi/v6RW5w8iZFr6wOgYd9QBPL60KTN2:1EyXXC4tLhinKKEZ4xgYLQw0g2
Malware Config
Signatures
Files
-
fe4f537e7ae4b9e4300c38ffdf1144ebe115d9bb9c7aabd58934260e8551ce98.dll windows x86
43b9251f5b45d71ed5232fec4e53269f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
GetVersion
GetStartupInfoA
MulDiv
VirtualAlloc
VirtualProtect
DosDateTimeToFileTime
IsBadWritePtr
InterlockedExchangeAdd
LoadLibraryA
GetVersionExA
Sleep
QueryPerformanceFrequency
IsDebuggerPresent
IsBadCodePtr
IsBadStringPtrA
SetLastError
GetProcessHeap
user32
IsWindowUnicode
GetWindowContextHelpId
GetWindowTextLengthA
GetWindowTextA
IsCharAlphaNumericA
IsCharAlphaA
GetWindowRgn
IsClipboardFormatAvailable
WindowFromDC
GetForegroundWindow
CopyIcon
GetAncestor
GetTitleBarInfo
GetLastActivePopup
GetTopWindow
IsZoomed
IsWindowVisible
GetGUIThreadInfo
GetParent
GetDesktopWindow
IsMenu
BlockInput
InSendMessage
GetWindowRect
advapi32
InitializeSecurityDescriptor
AreAnyAccessesGranted
IsValidSid
RevertToSelf
msvcrt
_adjust_fdiv
_initterm
free
_memicmp
srand
_ltoa
div
_CIpow
_CIfmod
_CItanh
ceil
__doserrno
_errno
__mb_cur_max
_pctype
malloc
floor
localeconv
_isctype
gdi32
GetPixel
GetStretchBltMode
GdiFlush
GdiGetBatchLimit
GetBkColor
ole32
CoGetCurrentProcess
shell32
ord66
Sections
.text Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 70KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ