Static task
static1
Behavioral task
behavioral1
Sample
5bfaa6c2fe8c313914893d411549fa9ce5c05d61d84805fec4cb873f54531d13.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5bfaa6c2fe8c313914893d411549fa9ce5c05d61d84805fec4cb873f54531d13.dll
Resource
win10v2004-20220812-en
General
-
Target
5bfaa6c2fe8c313914893d411549fa9ce5c05d61d84805fec4cb873f54531d13
-
Size
40KB
-
MD5
3ba6158ef7158a59e5b0b6e8eebd6abd
-
SHA1
afcc9767dd021119cefc457f6922976b5ffdc5db
-
SHA256
5bfaa6c2fe8c313914893d411549fa9ce5c05d61d84805fec4cb873f54531d13
-
SHA512
e3c85f38b2dd6fea6f62ae8d167e504d150c583489fe94c678e5777b63f30dbff18e38a42aabaaaf9953cb54a72a53dac350cba80fb3a5e2d842c1dd75b01b19
-
SSDEEP
384:IK2zp+kbiUmCWJIrVYZBgYJTa3h/vhcN22Ukjn9dmnNWoA71JajQ+wka+30:ozp+qiUmSggYex/YcnNWP1JajqD
Malware Config
Signatures
Files
-
5bfaa6c2fe8c313914893d411549fa9ce5c05d61d84805fec4cb873f54531d13.dll windows x86
143adbd50fcae31bd917a8be42202f71
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
wcschr
_ltow
??2@YAPAXI@Z
free
_purecall
realloc
??_U@YAPAXI@Z
memmove
_errno
_initterm
??3@YAXPAX@Z
_wcsnicmp
_beginthreadex
wcsncmp
_wcsrev
wcsstr
??_V@YAXPAX@Z
calloc
memset
_endthreadex
memcpy
shlwapi
SHEnumKeyExW
SHSetValueW
PathRemoveFileSpecW
PathFindFileNameA
SHGetValueW
PathFindFileNameW
atl
ord40
wininet
FindNextUrlCacheEntryW
DeleteUrlCacheEntryW
UnlockUrlCacheEntryFileW
FindFirstUrlCacheEntryW
FindCloseUrlCache
ntdll
RtlImageNtHeader
RtlImageDirectoryEntryToData
RtlRandom
NtQueryInformationFile
kernel32
GetTickCount
WaitForSingleObject
QueueUserAPC
SetEvent
SleepEx
LeaveCriticalSection
EnterCriticalSection
SetUnhandledExceptionFilter
WriteFile
ReadFile
GetFileSize
InitializeCriticalSectionAndSpinCount
CreateEventW
GetCommandLineW
MultiByteToWideChar
LocalFree
SetFilePointer
GetLastError
FlushInstructionCache
SetPriorityClass
Sleep
LoadLibraryW
UnmapViewOfFile
VirtualAlloc
GetProcAddress
MapViewOfFile
CreateFileMappingW
CreateFileW
GetModuleFileNameW
ExpandEnvironmentStringsW
GetCurrentProcessId
CloseHandle
RaiseException
GetCurrentThreadId
OpenThread
TerminateThread
user32
CharLowerBuffW
GetAncestor
SendMessageW
GetParent
RegisterClassW
UnregisterClassW
CreateWindowExW
PostMessageW
GetMessageW
TranslateMessage
DispatchMessageW
ScreenToClient
DestroyWindow
PostQuitMessage
DefWindowProcW
GetWindowLongW
FindWindowW
SetTimer
KillTimer
ShowWindow
SendMessageTimeoutW
SetWindowLongW
GetClientRect
ChildWindowFromPointEx
ClientToScreen
advapi32
SetSecurityInfo
GetSecurityDescriptorSacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
shell32
ShellExecuteExW
ole32
OleUninitialize
OleInitialize
oleaut32
DispInvoke
CreateDispTypeInfo
VarBstrCat
SafeArrayCreate
SafeArrayCopy
SafeArrayGetVartype
SafeArrayGetUBound
SafeArrayGetLBound
VarBstrCmp
VariantClear
SysAllocStringLen
SysStringLen
SysStringByteLen
SysAllocStringByteLen
SysFreeString
SysAllocString
SafeArrayUnlock
SafeArrayLock
DispGetIDsOfNames
SafeArrayDestroy
Sections
.text Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ