Static task
static1
Behavioral task
behavioral1
Sample
52aeebd3360d97864731924acd7f26d5f525f763badfd00c4fd210b87adad7b6.dll
Resource
win7-20220812-en
General
-
Target
52aeebd3360d97864731924acd7f26d5f525f763badfd00c4fd210b87adad7b6
-
Size
460KB
-
MD5
48f3bd89feef405b2f76546df198ca40
-
SHA1
fe2fb875ad052d95430d07f79b997d1fe4d3a5a2
-
SHA256
52aeebd3360d97864731924acd7f26d5f525f763badfd00c4fd210b87adad7b6
-
SHA512
ce8069522a8ab234aa9cf4c281a9f06c17b905620ca91259a3cc3c0140eacc9e06eef4c472ca6d53721a2b10e7e02dcf1e1ac77314c18f02df07273d7e4f7fed
-
SSDEEP
12288:kfSMDFWQ0iG6MgSy4ftbHF0z4u8fqLeI:k6MDIiG9gS1ftZ0peI
Malware Config
Signatures
Files
-
52aeebd3360d97864731924acd7f26d5f525f763badfd00c4fd210b87adad7b6.dll windows x86
4e5ae6f8233e5aa24da5bb3f00886d86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindClose
GetCurrentThreadId
OutputDebugStringA
GetVersion
SystemTimeToFileTime
WaitForSingleObject
SetEvent
GetTickCount
VirtualFree
CreateEventA
CreateProcessA
SetThreadPriority
VirtualUnlock
VirtualAlloc
VirtualLock
FindNextFileA
GetSystemTime
CreateThread
GetFileSize
GetCommandLineA
ReadFile
GetSystemInfo
FindResourceA
FreeResource
MapViewOfFile
UnmapViewOfFile
LoadResource
GetDriveTypeA
GetVolumeInformationA
SizeofResource
CreateFileMappingA
LockResource
GetDiskFreeSpaceA
MulDiv
GetCurrentProcessId
FlushFileBuffers
GetLocaleInfoW
FindFirstFileA
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetOEMCP
InterlockedExchange
RtlUnwind
GetStringTypeW
GetStringTypeA
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetCPInfo
GetCurrentDirectoryA
UnhandledExceptionFilter
HeapCreate
HeapDestroy
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
LCMapStringW
MultiByteToWideChar
LCMapStringA
VirtualProtect
TlsGetValue
TlsSetValue
TlsFree
TlsAlloc
HeapSize
HeapReAlloc
WideCharToMultiByte
RaiseException
GetFullPathNameA
GetVersionExA
CreateDirectoryA
TerminateProcess
GetExitCodeProcess
GetFileAttributesA
FormatMessageA
GetProcessHeap
HeapFree
HeapAlloc
ExitProcess
SetLastError
Sleep
SetUnhandledExceptionFilter
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteFileA
GetTempPathA
CloseHandle
GetTempFileNameA
WriteFile
SetFilePointer
CreateFileA
GetModuleHandleA
GetModuleFileNameA
LoadLibraryA
GetLocalTime
GetProcAddress
GetLastError
IsBadWritePtr
IsBadReadPtr
GetCurrentThread
GetCurrentProcess
InterlockedDecrement
InterlockedIncrement
FreeLibrary
lstrcpynA
VirtualQuery
GetComputerNameA
SetStdHandle
GetACP
user32
CreateCursor
LoadIconA
GetForegroundWindow
DestroyCursor
GetSystemMetrics
EndPaint
ClientToScreen
DestroyWindow
SetCursor
GetClassNameA
GetUpdateRgn
ScreenToClient
GetWindowRect
SetActiveWindow
PostQuitMessage
IsIconic
GetTopWindow
DrawTextA
GetPropA
GetFocus
GetParent
RemovePropA
IsWindowEnabled
FindWindowExA
SetFocus
ReleaseDC
GetDC
wsprintfA
IsWindowVisible
IsWindow
MessageBoxA
GetWindowTextLengthA
SendMessageA
BeginPaint
DrawFocusRect
IsDialogMessageA
ShowCursor
GetWindowTextA
SetPropA
SetWindowLongA
IntersectRect
InvalidateRect
GetWindowLongA
CreateWindowExA
SetClassLongA
EndDialog
GetCursorPos
ShowWindow
GetActiveWindow
GetClassInfoA
DefDlgProcA
AdjustWindowRectEx
EnableWindow
CallWindowProcA
LoadCursorA
GetDlgCtrlID
GetWindowThreadProcessId
RegisterClassA
GetWindow
GetClassLongA
GetDesktopWindow
GetMessageA
GetClientRect
TranslateMessage
PeekMessageA
DefWindowProcA
DispatchMessageA
SendDlgItemMessageA
GetDlgItem
PostMessageA
GetDlgItemTextA
SetDlgItemTextA
LoadStringA
DrawEdge
gdi32
GetStockObject
ExtTextOutA
GetSystemPaletteEntries
GetTextExtentPoint32A
CreateRectRgn
RectInRegion
CombineRgn
GetCharABCWidthsA
CreateDIBitmap
GdiFlush
GetCurrentObject
CreateFontA
SetPaletteEntries
SelectPalette
RealizePalette
CreatePalette
GetDeviceCaps
SetTextAlign
GetTextMetricsA
Rectangle
CreateCompatibleDC
SelectObject
DeleteObject
SetBkMode
SetBkColor
GetDIBits
GetRegionData
SetTextColor
DeleteDC
advapi32
RegFlushKey
RegDeleteValueA
RegQueryInfoKeyA
RegOpenKeyExA
RegCreateKeyExA
RegEnumKeyExA
RegQueryValueExA
RegSetValueExA
GetUserNameA
RegCloseKey
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
comdlg32
GetSaveFileNameA
Sections
.text Size: 272KB - Virtual size: 271KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 80KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rmnet Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE