Static task
static1
Behavioral task
behavioral1
Sample
c1e248acafe57ac2873efcd1c4c945dbca4120c3afa12178b64a37fa3103af8c.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c1e248acafe57ac2873efcd1c4c945dbca4120c3afa12178b64a37fa3103af8c.dll
Resource
win10v2004-20220812-en
General
-
Target
c1e248acafe57ac2873efcd1c4c945dbca4120c3afa12178b64a37fa3103af8c
-
Size
835KB
-
MD5
37d500a7493bbf3873d8de65f189d770
-
SHA1
3aae43587b8ed458e4d568e6c605ed0db7f9e76c
-
SHA256
c1e248acafe57ac2873efcd1c4c945dbca4120c3afa12178b64a37fa3103af8c
-
SHA512
ed5a4b20df60da4236b2223402c228c48505da2eed29a18325140044a8b54e7a195dc278926e9df6ca0fccd74414b2ea00247eb91bc67ae893449728d267585c
-
SSDEEP
24576:DmvRgiDJAB96QOBO5GNK+gsT9yXvO70d6pPO9eRb:Ji09lOBO5elxZyIw6pm9U
Malware Config
Signatures
Files
-
c1e248acafe57ac2873efcd1c4c945dbca4120c3afa12178b64a37fa3103af8c.dll windows x86
1f8095ae5e08530fd7127b4f35220fcf
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GetThreadContext
GetCurrentProcess
VirtualQuery
VirtualProtect
IsBadReadPtr
GetTempPathA
GetVersionExA
IsBadWritePtr
GlobalSize
DeleteCriticalSection
InterlockedDecrement
GetModuleFileNameA
ReadFile
SetStdHandle
RaiseException
HeapSize
RtlUnwind
ReleaseMutex
GetSystemDirectoryA
LeaveCriticalSection
SetErrorMode
GetFileType
lstrcatA
SetThreadContext
lstrlenA
CreateFileMappingA
GetExitCodeProcess
HeapReAlloc
MultiByteToWideChar
GetPrivateProfileSectionNamesA
GetStringTypeA
HeapDestroy
FindClose
GetStdHandle
TlsSetValue
LocalFree
SystemTimeToFileTime
GetStringTypeW
FreeEnvironmentStringsW
GlobalUnlock
GetPrivateProfileStringA
FreeResource
TerminateProcess
lstrcmpiA
ExitProcess
GetDiskFreeSpaceA
WaitForSingleObject
InitializeCriticalSection
LCMapStringW
FreeEnvironmentStringsA
RemoveDirectoryA
GetEnvironmentStringsW
CompareStringW
VirtualFree
FindFirstFileA
HeapFree
LoadLibraryExA
CreateEventA
GetEnvironmentStrings
GetProcAddress
GetSystemInfo
FormatMessageA
EnterCriticalSection
GlobalAlloc
FindResourceA
TlsAlloc
GetEnvironmentVariableA
GetModuleHandleA
GetCommandLineA
VirtualAlloc
GetTickCount
CreateMutexA
IsBadCodePtr
GetLocalTime
GetCurrentThread
GetOEMCP
VerifyVersionInfoA
GetProcessAffinityMask
TlsFree
GetWindowsDirectoryA
lstrcpyA
FreeLibrary
lstrcpynA
lstrcmpA
SetUnhandledExceptionFilter
GetProcessTimes
CreateProcessA
QueryPerformanceFrequency
SizeofResource
DuplicateHandle
SetFilePointer
SetLastError
GetCurrentProcessId
GlobalLock
VirtualProtectEx
CreateDirectoryA
MapViewOfFile
FlushFileBuffers
DeleteFileA
FindNextFileA
UnmapViewOfFile
GetSystemDefaultLangID
GlobalFree
HeapCreate
GetFileAttributesA
GetDriveTypeA
InterlockedExchange
lstrlenW
InterlockedIncrement
QueryPerformanceCounter
OpenProcess
Sleep
GetPrivateProfileIntA
HeapAlloc
CompareFileTime
GetFileSize
FindResourceExA
UnhandledExceptionFilter
CreateFileA
ResumeThread
GetLastError
LockResource
CompareStringA
LCMapStringA
WriteProcessMemory
SetHandleCount
TlsGetValue
CloseHandle
GetStartupInfoA
MulDiv
MoveFileExA
SetEvent
GetVersion
WideCharToMultiByte
LoadResource
FlushInstructionCache
GetCurrentThreadId
GetCPInfo
WriteFile
ResetEvent
GetACP
GetTempFileNameA
SearchPathA
user32
SetForegroundWindow
MapWindowPoints
DefWindowProcA
SetFocus
WaitForInputIdle
ScreenToClient
PeekMessageA
DrawFocusRect
RegisterClassExA
LoadIconA
ShowWindow
CharUpperA
MoveWindow
MapDialogRect
CallWindowProcA
IsWindow
FillRect
DestroyWindow
wsprintfA
EndDialog
GetParent
GetDC
LoadImageA
EnumChildWindows
GetDesktopWindow
CreateDialogParamA
IntersectRect
GetMessageA
CopyRect
IsDialogMessageA
GetClientRect
GetClassNameA
MsgWaitForMultipleObjects
SetWindowLongA
LoadStringA
GetDlgItem
GetWindowDC
EnableWindow
GetWindowTextA
UpdateWindow
DispatchMessageA
EndPaint
GetDlgItemTextA
RemovePropA
InflateRect
GetPropA
CreateWindowExA
SetActiveWindow
SendDlgItemMessageA
SetWindowTextA
InvalidateRect
GetWindow
SetPropA
ReleaseDC
EnableMenuItem
SetWindowPos
DrawTextA
TranslateMessage
MessageBoxA
DrawIcon
SetDlgItemTextA
CreateDialogIndirectParamA
DialogBoxIndirectParamA
GetWindowLongA
BeginPaint
IsWindowEnabled
SystemParametersInfoA
GetSysColor
GetWindowRect
SendMessageA
gdi32
GetObjectA
DeleteObject
SetStretchBltMode
SelectClipRgn
SetViewportOrgEx
GetTextExtentPoint32A
GetDeviceCaps
SetViewportExtEx
CreateSolidBrush
CreateBitmap
RestoreDC
GetDIBColorTable
SelectPalette
UnrealizeObject
BitBlt
CreateDCA
SetWindowOrgEx
SetMetaFileBitsEx
CreateHalftonePalette
GetStockObject
SetBkMode
PatBlt
GetSystemPaletteEntries
CreateRectRgn
SelectObject
PlayMetaFile
SaveDC
SetPixel
CreateCompatibleBitmap
CreateFontIndirectA
DeleteMetaFile
SetWindowExtEx
TextOutA
RealizePalette
CreatePalette
CreateDIBitmap
SetMapMode
CreatePatternBrush
DeleteDC
SetBkColor
StretchBlt
CreateCompatibleDC
SetTextColor
advapi32
RegEnumKeyExA
SetSecurityDescriptorOwner
RegOpenKeyExA
AllocateAndInitializeSid
RegDeleteKeyA
RegEnumKeyA
OpenProcessToken
OpenThreadToken
SetSecurityDescriptorGroup
RegOpenKeyA
SetSecurityDescriptorDacl
RegCloseKey
EqualSid
RegQueryValueExA
InitializeSecurityDescriptor
GetTokenInformation
FreeSid
shell32
SHGetMalloc
SHGetSpecialFolderLocation
ShellExecuteExA
SHGetPathFromIDListA
ole32
CoInitializeSecurity
CoUninitialize
CoInitialize
rpcrt4
RpcStringFreeA
UuidToStringA
UuidCreate
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
avifil32
AVIMakeStreamFromClipboard
lz32
LZClose
LZOpenFileA
LZCopy
Sections
.text Size: 803KB - Virtual size: 803KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.qyanq Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ