tdvwxjrcdf
Static task
static1
Behavioral task
behavioral1
Sample
f0b2d93e55f4ac65290797fcccd7b67b359ee8c3d15aa94a4acb5c5778327a5d.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f0b2d93e55f4ac65290797fcccd7b67b359ee8c3d15aa94a4acb5c5778327a5d.dll
Resource
win10v2004-20220812-en
General
-
Target
f0b2d93e55f4ac65290797fcccd7b67b359ee8c3d15aa94a4acb5c5778327a5d
-
Size
604KB
-
MD5
692ba8f7855ced0e6e6d777b71beebf0
-
SHA1
8fb8e69b1d31981b2b218617bfe78d79992ea92d
-
SHA256
f0b2d93e55f4ac65290797fcccd7b67b359ee8c3d15aa94a4acb5c5778327a5d
-
SHA512
f6c2808e6edc050091f0d5ee70518580da61f2369f2e6298decbffda0c9d12184732e4cfcb51956e71d20b71adfd1d48b18264e86002c46d0041d84f1ccab5e4
-
SSDEEP
12288:KIL5FfFByrmE9n6GGs4WWkfZ1in2XBNLUnX5FUKYJ6yCl8eBTAI+NboHzrI54H:KIdFirmE9n6VWWC1isBNLUXAKYJ6yCaK
Malware Config
Signatures
Files
-
f0b2d93e55f4ac65290797fcccd7b67b359ee8c3d15aa94a4acb5c5778327a5d.dll windows x86
c0a983aac0c4917a27539ade66500b79
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CreateFileW
FindNextVolumeMountPointW
GetCurrentProcess
GetLocaleInfoA
InterlockedCompareExchange
InterlockedExchange
LocalAlloc
LocalFree
SetThreadIdealProcessor
SetUnhandledExceptionFilter
Sleep
TerminateProcess
UnhandledExceptionFilter
lstrcatW
lstrcpyW
lstrcpynW
lstrlenW
CreateMailslotA
FindResourceW
FreeResource
GetProcAddress
GlobalFree
LoadResource
LockResource
CreateDirectoryExW
DeleteVolumeMountPointA
FindFirstVolumeA
GetCommModemStatus
GetCurrentProcessId
GetCurrentThreadId
GetProcessWorkingSetSize
GetStringTypeExW
GetSystemTimeAsFileTime
GetTickCount
HeapSetInformation
QueryPerformanceCounter
ReadFileScatter
ReplaceFileW
SuspendThread
VirtualAlloc
DeleteCriticalSection
FormatMessageW
FreeLibrary
GetLastError
HeapAlloc
HeapCreate
InitializeCriticalSection
LeaveCriticalSection
RaiseException
CopyFileW
CreateJobObjectW
DuplicateHandle
EnumSystemGeoID
GetPrivateProfileStringW
GetProfileSectionW
LoadLibraryExW
RemoveDirectoryW
SetThreadPriorityBoost
WriteConsoleA
DisableThreadLibraryCalls
EnterCriticalSection
InterlockedDecrement
InterlockedIncrement
ReadConsoleW
GetAtomNameA
GetPrivateProfileStructA
GetUserDefaultLCID
GlobalSize
LoadLibraryA
Module32FirstW
MultiByteToWideChar
TlsGetValue
TlsSetValue
lstrcmpiA
lstrcpynA
lstrlen
GlobalFindAtomA
IsBadWritePtr
ExpandEnvironmentStringsW
FileTimeToLocalFileTime
FileTimeToSystemTime
GetComputerNameW
GetDateFormatW
GetPrivateProfileStringA
GetProcessHeap
GetProcessHeaps
GetTimeFormatW
HeapFree
SetConsoleScreenBufferSize
SetProcessPriorityBoost
WideCharToMultiByte
CreateEventA
CreateIoCompletionPort
GetCommandLineW
GetSystemWindowsDirectoryA
InitializeCriticalSectionAndSpinCount
IsBadStringPtrW
OutputDebugStringA
PostQueuedCompletionStatus
ReadFile
SetCriticalSectionSpinCount
SetEnvironmentVariableA
SetEvent
SetLastError
WaitForSingleObject
WriteFile
WriteFileEx
GetSystemWow64DirectoryA
GlobalAlloc
GlobalLock
GlobalReAlloc
GlobalUnlock
GetLocalTime
SetLocalTime
RtlUnwind
GetModuleHandleW
ExitProcess
DecodePointer
EncodePointer
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
FindClose
GetDriveTypeW
FindFirstFileExW
ReadConsoleInputW
SetConsoleMode
GetConsoleMode
ExitThread
CreateThread
ReadConsoleInputA
PeekConsoleInputA
GetNumberOfConsoleInputEvents
ResumeThread
GetTimeZoneInformation
CreateProcessW
FatalAppExitA
GetCommandLineA
TlsAlloc
TlsFree
GetCurrentThread
IsDebuggerPresent
HeapDestroy
GetConsoleCP
IsProcessorFeaturePresent
SetConsoleCtrlHandler
LoadLibraryW
GetLocaleInfoW
GetStdHandle
GetModuleFileNameW
GetStringTypeW
LCMapStringW
CompareStringW
FindNextFileW
GetFullPathNameW
GetFileInformationByHandle
PeekNamedPipe
GetFileType
GetCurrentDirectoryW
SetCurrentDirectoryW
WriteConsoleW
GetFileAttributesA
SetEnvironmentVariableW
SetHandleCount
GetStartupInfoW
CreateProcessA
GetFileAttributesW
CreatePipe
HeapSize
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetFilePointer
SetStdHandle
FlushFileBuffers
HeapReAlloc
EnumSystemLocalesA
IsValidLocale
FindFirstFileExA
FindNextFileA
SetEndOfFile
GetExitCodeProcess
GetFullPathNameA
ole32
OleCreateDefaultHandler
StgCreatePropSetStg
CreateFileMoniker
CoSetCancelObject
CoRegisterMessageFilter
CoGetProcessIdentifier
CLIPFORMAT_UserFree
CoQueryReleaseObject
OleInitialize
CoTaskMemFree
CoCreateInstance
PropVariantClear
IIDFromString
CoTaskMemAlloc
OleRegGetUserType
SNB_UserMarshal
HBITMAP_UserUnmarshal
CoEnableCallCancellation
StringFromGUID2
DllGetClassObjectWOW
CoTaskMemRealloc
CoMarshalInterface
CoInitializeWOW
CoFreeLibrary
CoAllowSetForegroundWindow
OleRegEnumFormatEtc
rpcrt4
I_RpcTransServerNewConnection
RpcBindingToStringBindingW
UuidIsNil
UuidFromStringW
UuidCreateNil
UuidCompare
NdrXmitOrRepAsBufferSize
NdrInterfacePointerFree
I_RpcServerSetAddressChangeFn
NdrConformantStructMarshall
RpcAsyncCompleteCall
IUnknown_QueryInterface_Proxy
RpcServerInqIf
RpcServerInqDefaultPrincNameW
RpcRevertToSelf
RpcMgmtInqIfIds
RpcMgmtEpEltInqNextW
RpcAsyncAbortCall
NdrpGetProcFormatString
NdrUserMarshalFree
NdrRpcSsEnableAllocate
UuidHash
RpcServerUseAllProtseqsIf
RpcNsBindingInqEntryNameA
NdrTypeFree
RpcSsDontSerializeContext
user32
CopyAcceleratorTableW
UnregisterClassA
GetClipboardSequenceNumber
GetMenuItemInfoA
OemKeyScan
TranslateMessage
EnumDesktopsA
RealGetWindowClassA
RealGetWindowClassW
CharNextA
CreateIconFromResourceEx
DrawAnimatedRects
IMPQueryIMEA
IsDialogMessage
MessageBoxIndirectA
DefMDIChildProcA
EnumPropsW
GetClipCursor
GetTabbedTextExtentW
GetWindowContextHelpId
SubtractRect
GetDlgItemInt
IsCharUpperA
IsWinEventHookInstalled
WINNLSGetIMEHotkey
CharPrevW
EnumClipboardFormats
RegisterDeviceNotificationA
SetMenuItemInfoA
CharLowerBuffW
CopyIcon
CreateMenu
DdeQueryStringW
DrawTextA
RegisterRawInputDevices
Exports
Exports
Sections
.text Size: 467KB - Virtual size: 466KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 39KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ