Static task
static1
Behavioral task
behavioral1
Sample
ee2a2032be42cd46ca93437eded6fb4344ddb7e62a5059e52d5f14a641199f3c.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ee2a2032be42cd46ca93437eded6fb4344ddb7e62a5059e52d5f14a641199f3c.dll
Resource
win10v2004-20220812-en
General
-
Target
ee2a2032be42cd46ca93437eded6fb4344ddb7e62a5059e52d5f14a641199f3c
-
Size
103KB
-
MD5
7cdd7c0835e479fca6a1660ce91512e3
-
SHA1
75570c3824fe8cc8bbf674d6d15220c2ee7135a4
-
SHA256
ee2a2032be42cd46ca93437eded6fb4344ddb7e62a5059e52d5f14a641199f3c
-
SHA512
cf75d4f048ac1561c327f99c76f7851a573ef6d2421677231a9574bf0193c93348728de2d8863cd951268f8ab4041a504f84b0ff9f7b47891903cf749944c2a1
-
SSDEEP
3072:VkJsYEMC18tSwgGzEKt35qDdZktJxdqjAs1:608tSwXgW5GZU0jAc
Malware Config
Signatures
Files
-
ee2a2032be42cd46ca93437eded6fb4344ddb7e62a5059e52d5f14a641199f3c.dll windows x86
dae6a7610a7443427ea054ff1b1b9df9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetPrivateProfileIntA
GetProcessTimes
SetConsoleScreenBufferSize
SetVDMCurrentDirectories
Heap32Next
GetModuleHandleW
SetWaitableTimer
WriteConsoleInputVDMA
CreateSemaphoreW
IsDBCSLeadByte
DebugActiveProcess
GetVolumeNameForVolumeMountPointW
FindNextVolumeMountPointA
SetSystemTimeAdjustment
WaitForDebugEvent
GetTimeFormatW
ChangeTimerQueueTimer
OpenProfileUserMapping
HeapUnlock
SetErrorMode
FindFirstVolumeMountPointW
GetModuleHandleW
_lcreat
GetDevicePowerState
GetProcAddress
SetMessageWaitingIndicator
LocalFileTimeToFileTime
user32
SendMessageA
EnumClipboardFormats
DrawIcon
GetMenuState
ShowCaret
FillRect
GetClassInfoExA
GetIconInfo
GetLastInputInfo
CharUpperBuffA
GetClassNameW
EnumWindows
DlgDirSelectComboBoxExA
PostThreadMessageA
CharLowerA
IsZoomed
GetMonitorInfoW
DdeClientTransaction
ScrollWindowEx
LoadAcceleratorsA
DialogBoxIndirectParamAorW
EnumDisplayMonitors
CreateDialogIndirectParamA
BringWindowToTop
TabbedTextOutA
IsCharLowerA
GetAncestor
InvalidateRgn
SetWindowContextHelpId
PtInRect
Sections
yxcjqzsf Size: 5KB - Virtual size: 152KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
hspkvefm Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
qvihirqz Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
polufqlk Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ctermnwh Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
dadmhyly Size: 106B - Virtual size: 106B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
yfavyjsf Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
zezqdsfa Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
wzazkpiz Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
wfqnwlsr Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE