Static task
static1
Behavioral task
behavioral1
Sample
a760e53a653b55b34e47aea12fff95d7682fdad89e243808932ab84b81e6bb93.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a760e53a653b55b34e47aea12fff95d7682fdad89e243808932ab84b81e6bb93.dll
Resource
win10v2004-20220901-en
General
-
Target
a760e53a653b55b34e47aea12fff95d7682fdad89e243808932ab84b81e6bb93
-
Size
40KB
-
MD5
558849ab9bb8a1811ce6e0f76ee372cb
-
SHA1
1fe5b66f59916bd28c495249860710cbddf2dcda
-
SHA256
a760e53a653b55b34e47aea12fff95d7682fdad89e243808932ab84b81e6bb93
-
SHA512
9c7027cc95660331352fb20f339c9ef0c55d86f8c8a16dd033700df1b4357f2408f1832b89aae2f6d8b2c11363df8a7f22e7cb9d999d5d4ec6f4b497765de499
-
SSDEEP
768:Tx7O+92GsvkHPMxgYW08S1c1/JOR6shzwVuBrZ:EMHEKsA/JhsfZ
Malware Config
Signatures
Files
-
a760e53a653b55b34e47aea12fff95d7682fdad89e243808932ab84b81e6bb93.dll windows x86
9884ba315d910337ed6434f00c2326e8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
wcsncmp
free
_endthreadex
calloc
realloc
??2@YAPAXI@Z
_purecall
memmove
_errno
??3@YAXPAX@Z
_initterm
wcschr
_ltow
??_U@YAPAXI@Z
_wcsrev
wcsstr
??_V@YAXPAX@Z
_beginthreadex
memset
swprintf
memcpy
shlwapi
SHEnumKeyExW
SHSetValueW
SHGetValueW
PathRemoveFileSpecW
PathFindFileNameW
ws2_32
WSAStartup
atl
ord40
wininet
FindNextUrlCacheEntryW
DeleteUrlCacheEntryW
UnlockUrlCacheEntryFileW
FindFirstUrlCacheEntryW
FindCloseUrlCache
ntdll
RtlRandom
kernel32
GetTickCount
WaitForSingleObject
QueueUserAPC
SetEvent
SleepEx
LeaveCriticalSection
EnterCriticalSection
SetPriorityClass
SetProcessAffinityMask
SetUnhandledExceptionFilter
MultiByteToWideChar
WriteFile
ReadFile
GetFileSize
InitializeCriticalSectionAndSpinCount
CreateEventW
GetCommandLineW
LocalFree
SetFilePointer
GetLastError
GetProcessAffinityMask
Sleep
FlushInstructionCache
LoadLibraryW
UnmapViewOfFile
VirtualAlloc
GetProcAddress
MapViewOfFile
CreateFileMappingW
CreateFileW
RaiseException
GetCurrentThreadId
OpenThread
TerminateThread
CloseHandle
GetCurrentProcessId
ExpandEnvironmentStringsW
GetModuleFileNameW
user32
ChildWindowFromPointEx
GetAncestor
SendMessageW
RegisterClassW
UnregisterClassW
CreateWindowExW
PostMessageW
GetMessageW
TranslateMessage
DispatchMessageW
SetWindowLongW
DestroyWindow
PostQuitMessage
GetParent
GetWindowLongW
FindWindowW
SetTimer
KillTimer
ShowWindow
SendMessageTimeoutW
CharLowerBuffW
GetClientRect
CharUpperBuffW
GetClassNameW
DefWindowProcW
ClientToScreen
ScreenToClient
advapi32
SetSecurityInfo
GetSecurityDescriptorSacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
shell32
ShellExecuteExW
ole32
OleUninitialize
OleInitialize
StringFromCLSID
ProgIDFromCLSID
CoTaskMemFree
oleaut32
SafeArrayCreate
SafeArrayCopy
SafeArrayGetVartype
SafeArrayGetUBound
SafeArrayGetLBound
VarBstrCmp
VariantClear
SysAllocStringLen
SysStringLen
SysStringByteLen
SysAllocStringByteLen
SysFreeString
SysAllocString
SafeArrayUnlock
SafeArrayLock
DispGetIDsOfNames
DispInvoke
CreateDispTypeInfo
VarBstrCat
SafeArrayDestroy
Sections
.text Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ