Static task
static1
Behavioral task
behavioral1
Sample
907194e76989c7a4cd131c0bad3ea0f516389a0cd6b4eba9c680c1b3cb4efaab.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
907194e76989c7a4cd131c0bad3ea0f516389a0cd6b4eba9c680c1b3cb4efaab.dll
Resource
win10v2004-20220812-en
General
-
Target
907194e76989c7a4cd131c0bad3ea0f516389a0cd6b4eba9c680c1b3cb4efaab
-
Size
132KB
-
MD5
5624a8ec9ee83658c10f6f931aa771ae
-
SHA1
24b36b05c80850a383c7246e83921516fbfeb17e
-
SHA256
907194e76989c7a4cd131c0bad3ea0f516389a0cd6b4eba9c680c1b3cb4efaab
-
SHA512
88d1edca9c23d8c09b32a78964e1014b297a6775b0ef6a8e619291f4e4e0d4eae17d5c8c1e845b7ebe48cb9f2e9586e345b39294334c3c5a76ca3bb5bb78b6dc
-
SSDEEP
3072:7vLvWZR9sR+jpxW4nEY5gKnZbxKpIU232XJgobGLS/a:HyR9sR+jpxXnv5g4nKpRGLS/
Malware Config
Signatures
Files
-
907194e76989c7a4cd131c0bad3ea0f516389a0cd6b4eba9c680c1b3cb4efaab.dll windows x86
821252a281f50be08c5f7c5adc3729a3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateEventA
GetLastError
SetEvent
FlushFileBuffers
WriteFile
SetFilePointer
CreateFileA
WaitForMultipleObjects
GetProcAddress
LoadLibraryA
GetFileAttributesA
GetTempPathA
GetWindowsDirectoryA
GetSystemDirectoryA
ReleaseMutex
ReadFile
GetFileSize
WaitForSingleObject
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
OpenFileMappingA
MultiByteToWideChar
lstrlenA
InitializeCriticalSection
DeleteCriticalSection
ResumeThread
CreateThread
GetModuleFileNameA
CreateIoCompletionPort
TerminateThread
PostQueuedCompletionStatus
ExitThread
LeaveCriticalSection
EnterCriticalSection
OpenEventA
DisconnectNamedPipe
GetQueuedCompletionStatus
ConnectNamedPipe
TerminateProcess
DeleteFileA
FreeLibrary
lstrcmpA
MoveFileExA
MoveFileA
lstrcatA
GetTempFileNameA
GetShortPathNameA
GetVersion
SetFileAttributesA
SetEnvironmentVariableA
CompareStringW
CompareStringA
CloseHandle
OpenMutexA
CreateNamedPipeA
CreateMutexA
LCMapStringW
LCMapStringA
SetStdHandle
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
InterlockedIncrement
InterlockedDecrement
IsBadCodePtr
IsBadReadPtr
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
RtlUnwind
RaiseException
HeapFree
HeapAlloc
GetTimeZoneInformation
GetSystemTime
GetLocalTime
GetCommandLineA
ExitProcess
GetCurrentProcess
HeapReAlloc
HeapSize
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
SetUnhandledExceptionFilter
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
WideCharToMultiByte
GetModuleHandleA
SetHandleCount
GetStdHandle
GetFileType
user32
PostThreadMessageA
shell32
ShellExecuteExA
ole32
StgOpenStorage
StgCreateDocfile
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
wininet
HttpOpenRequestA
HttpAddRequestHeadersA
InternetOpenA
InternetConnectA
InternetSetOptionA
InternetAttemptConnect
InternetCloseHandle
HttpSendRequestA
HttpQueryInfoA
InternetReadFile
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
rpcrt4
UuidCreate
UuidToStringA
netapi32
Netbios
Sections
.text Size: 96KB - Virtual size: 94KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ