Static task
static1
Behavioral task
behavioral1
Sample
8ed103e9ebae67c6c7c021145581db60e29bd524a427674ac415a0db2fab64dc.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8ed103e9ebae67c6c7c021145581db60e29bd524a427674ac415a0db2fab64dc.dll
Resource
win10v2004-20220901-en
General
-
Target
8ed103e9ebae67c6c7c021145581db60e29bd524a427674ac415a0db2fab64dc
-
Size
124KB
-
MD5
61d0da31cdece0889689c26895047338
-
SHA1
d65d159840693cdd5a5877f06d8661e00b450e09
-
SHA256
8ed103e9ebae67c6c7c021145581db60e29bd524a427674ac415a0db2fab64dc
-
SHA512
28fa522b34c2a1523e504d702a4b4aaae8b5d1ee14cbb08ffcc91dc13cb74a2073e0f8fda4f8a5e92099297d3060f9e4a90d07b4aea3337133662e5f956cb24d
-
SSDEEP
3072:IqXbWQgZaRpw9InzPnCnDB1978JybiSobdIX+LQe:IqXbjiyrnC919pbBo6+LQ
Malware Config
Signatures
Files
-
8ed103e9ebae67c6c7c021145581db60e29bd524a427674ac415a0db2fab64dc.dll windows x86
e2e010799ac3f69ea7928df66eed5cdf
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
ole32
StgPropertyLengthAsVariant
PropVariantClear
IsEqualGUID
winmm
waveInGetDevCapsA
timeKillEvent
timeBeginPeriod
mod32Message
waveInStart
midiOutSetVolume
midiInStart
WOW32DriverCallback
PlaySoundW
waveOutRestart
waveOutUnprepareHeader
mmioInstallIOProcA
advapi32
LsaSetInformationTrustedDomain
SetUserFileEncryptionKey
SetSecurityDescriptorDacl
RegisterEventSourceA
RegQueryValueExA
OpenTraceW
LsaRemoveAccountRights
LookupPrivilegeNameW
I_ScSetServiceBitsA
GetTrusteeNameW
GetSecurityDescriptorDacl
GetAclInformation
GetAce
FileEncryptionStatusA
CancelOverlappedAccess
BuildExplicitAccessWithNameW
AddAccessDeniedAce
user32
TranslateMessage
UpdateWindow
ShowWindow
SetUserObjectSecurity
SetSystemCursor
SetRect
RemoveMenu
RegisterWindowMessageW
RegisterShellHookWindow
RegisterClassA
PeekMessageA
OpenClipboard
MsgWaitForMultipleObjects
MessageBoxW
GetTopWindow
GetKeyState
GetForegroundWindow
GetCaretPos
EnumPropsA
DispatchMessageA
DialogBoxParamA
DefWindowProcA
CreateWindowExA
CharToOemA
CharLowerW
CharLowerBuffA
BeginDeferWindowPos
EmptyClipboard
kernel32
GetVersionExA
HeapCreate
MulDiv
OpenEventW
OpenJobObjectW
ReadFile
HeapAlloc
SetFileTime
TlsGetValue
WaitForMultipleObjectsEx
lstrcmpA
GetTimeZoneInformation
SetEnvironmentVariableA
GlobalAddAtomA
CreateSemaphoreA
CloseHandle
BindIoCompletionCallback
GetWindowsDirectoryA
GetTempPathW
GetSystemInfo
GetSystemDefaultLangID
GetStringTypeExA
GetPrivateProfileSectionW
GetModuleHandleA
GetFileAttributesExA
GetCurrentProcessId
DeleteCriticalSection
GetConsoleOutputCP
GetConsoleAliasA
GetCommandLineA
GetBinaryTypeA
FormatMessageA
FlushConsoleInputBuffer
FindNextVolumeW
FindAtomW
FindAtomA
ExitProcess
EnumTimeFormatsA
DuplicateHandle
Beep
ws2_32
WSCDeinstallProvider
closesocket
connect
gethostbyname
htons
socket
WSAUnhookBlockingHook
WSAGetLastError
dinput
DirectInputCreateW
shell32
SHGetSpecialFolderPathW
ShellExecuteA
SHFileOperationW
Sections
.text Size: 88KB - Virtual size: 87KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ