CreateInterface
Static task
static1
Behavioral task
behavioral1
Sample
1e873307480d62966ee5d462ffae561792c131c390b315ac31e9653935244ca3.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1e873307480d62966ee5d462ffae561792c131c390b315ac31e9653935244ca3.dll
Resource
win10v2004-20220812-en
General
-
Target
1e873307480d62966ee5d462ffae561792c131c390b315ac31e9653935244ca3
-
Size
540KB
-
MD5
61d1743389d298af2edaf46a48a9c638
-
SHA1
b601c441052c40a80b1a0eb52377957d2ce9be60
-
SHA256
1e873307480d62966ee5d462ffae561792c131c390b315ac31e9653935244ca3
-
SHA512
a56e2393c793344beda8c046b77047d9858ec5ea2f127b9a85627d01afb16428d6425e4a155832f8309d6ebbc4f04dbf6b24ac5e28597c2389a61f336d0fcf13
-
SSDEEP
12288:UxZkGA9m5AP4QmldXUGYv7Png4LWbG0GbYjRg2UVsAarPoK5U1Im3pHQCaOOf/:Uv5AP4QmlGgy+GbYjRxUS9LoKk9Ih/
Malware Config
Signatures
Files
-
1e873307480d62966ee5d462ffae561792c131c390b315ac31e9653935244ca3.dll windows x86
23801ab2f6210a5b90bbf89fedb16451
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcess
LeaveCriticalSection
OutputDebugStringA
EnterCriticalSection
InitializeCriticalSection
GetEnvironmentVariableA
GetModuleFileNameA
TerminateProcess
VirtualQuery
HeapAlloc
GetProcessHeap
FindNextFileA
FindClose
FindFirstFileA
SetConsoleTextAttribute
GetStdHandle
GetModuleHandleA
GetConsoleScreenBufferInfo
GetNumberOfConsoleInputEvents
PeekConsoleInputA
GetConsoleMode
SetConsoleMode
ReadConsoleInputA
GetLocaleInfoW
SetConsoleCtrlHandler
SetEndOfFile
IsBadCodePtr
IsBadWritePtr
IsBadReadPtr
SetUnhandledExceptionFilter
RaiseException
CreateFileA
SetStdHandle
MultiByteToWideChar
WideCharToMultiByte
GetProcAddress
LoadLibraryA
FreeLibrary
GetDriveTypeA
GetCurrentDirectoryA
GetFullPathNameA
GetLastError
CreateDirectoryA
FileTimeToSystemTime
FileTimeToLocalFileTime
GetFileAttributesA
SetEnvironmentVariableA
SetCurrentDirectoryA
GetCurrentThreadId
GetCommandLineA
GetVersionExA
RtlUnwind
ExitProcess
DeleteCriticalSection
FatalAppExitA
TlsAlloc
SetLastError
GetCurrentThread
TlsFree
TlsSetValue
TlsGetValue
SetHandleCount
GetFileType
GetStartupInfoA
SetEnvironmentVariableW
CloseHandle
ReadFile
SetFilePointer
VirtualProtect
VirtualAlloc
GetSystemInfo
GetACP
GetOEMCP
GetCPInfo
WriteFile
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
UnhandledExceptionFilter
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringA
LCMapStringW
InterlockedExchange
GetStringTypeA
GetStringTypeW
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
GetTimeZoneInformation
FlushFileBuffers
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
CompareStringA
CompareStringW
WriteConsoleA
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
tier0
?DevMsg@@YAXPBDZZ
DevMsg
_AssertValidReadPtr
_AssertValidWritePtr
AssertValidStringPtr
MemAllocScratch
MemFreeScratch
CommandLine_Tier0
Warning
Error
SpewOutputFunc
g_pMemAlloc
Msg
GetCPUInformation
vstdlib
KeyValuesSystem
Exports
Exports
Sections
.text Size: 276KB - Virtual size: 274KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 113KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text Size: 196KB - Virtual size: 196KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE