Static task
static1
Behavioral task
behavioral1
Sample
2b0fd42cbcda0cfe9c48f5c594431f7cbca372549fb0efe4a86a079505bfe574.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2b0fd42cbcda0cfe9c48f5c594431f7cbca372549fb0efe4a86a079505bfe574.dll
Resource
win10v2004-20220901-en
General
-
Target
2b0fd42cbcda0cfe9c48f5c594431f7cbca372549fb0efe4a86a079505bfe574
-
Size
132KB
-
MD5
3068f2bcf323e7a9a8a735dda27518de
-
SHA1
1d5f2f50528d54abd0304a5fcdf2c478b3da66e5
-
SHA256
2b0fd42cbcda0cfe9c48f5c594431f7cbca372549fb0efe4a86a079505bfe574
-
SHA512
05f758bdba7464af0199959f2855aa1e7899514291a128df1bd1c6ab6a4b4f16f43fc1618e528c56c5e374fe818b6238e17581ef549d1cf7830e58b0462dc724
-
SSDEEP
3072:wuQYDWkJHpanBERnqCp4lmaD5XfWNXBp3rq29n9GE:kY6UanBmhp2+xle2
Malware Config
Signatures
Files
-
2b0fd42cbcda0cfe9c48f5c594431f7cbca372549fb0efe4a86a079505bfe574.dll windows x86
4b8abd9b2dd87b0591cf000853d22927
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalAlloc
GetDriveTypeW
lstrlenW
GetCurrentProcess
GetProcAddress
OpenProcess
UnhandledExceptionFilter
GetProcessHeap
InterlockedIncrement
MultiByteToWideChar
GetACP
ExitProcess
HeapDestroy
SetHandleCount
GetFileType
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
WriteFile
InterlockedCompareExchange
Sleep
InterlockedExchange
LocalFree
GetLocaleInfoA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
HeapSize
GetCPInfo
GetOEMCP
GetLastError
GetStartupInfoA
GetModuleHandleA
VirtualQuery
GetSystemInfo
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
RtlUnwind
HeapFree
HeapAlloc
WideCharToMultiByte
GetVersionExA
LoadLibraryW
SetUnhandledExceptionFilter
TerminateProcess
FreeLibrary
WaitForSingleObject
LocalReAlloc
LoadLibraryA
CloseHandle
GetVersionExW
GetCommandLineA
VirtualProtect
user32
DestroyWindow
IsWindow
SetWindowPos
GetClientRect
EndDialog
FrameRect
DrawFocusRect
InflateRect
DrawEdge
OffsetRect
GetSysColor
FillRect
GetSysColorBrush
EnableWindow
IsDlgButtonChecked
SetDlgItemInt
SetFocus
ExitWindowsEx
GetDlgItemInt
GetWindowRect
ShowWindow
GetWindowTextA
GetFocus
MapWindowPoints
ReleaseDC
GetDC
GetWindowThreadProcessId
IsWindowVisible
SetDlgItemTextA
GetDlgItemTextA
GetDlgItem
MessageBeep
CheckDlgButton
advapi32
AdjustTokenPrivileges
OpenProcessToken
LookupPrivilegeValueW
RegCloseKey
gdi32
SelectObject
SetBkMode
SetTextColor
CreateSolidBrush
DeleteObject
Rectangle
SetROP2
SetBkColor
Sections
.text Size: 64KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 40KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ