Static task
static1
Behavioral task
behavioral1
Sample
1cd836d3ccb8d04d1770a42202dca2e37af9761b1f60d6af9577a0bac49796e0.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1cd836d3ccb8d04d1770a42202dca2e37af9761b1f60d6af9577a0bac49796e0.dll
Resource
win10v2004-20220812-en
General
-
Target
1cd836d3ccb8d04d1770a42202dca2e37af9761b1f60d6af9577a0bac49796e0
-
Size
140KB
-
MD5
68ad43d5f16e251450fb65a6296f651e
-
SHA1
3d0f04327caf20f0e255832e0caca8f8b3c4610c
-
SHA256
1cd836d3ccb8d04d1770a42202dca2e37af9761b1f60d6af9577a0bac49796e0
-
SHA512
9bae3c58de8aae0c911ee6c0b0857f2f6cc9c99d1c8fef559c476dec3114692a974b6b7a379db35f8e88089eaf9eb57a6694ab76f6546c3d69b3e4b6d04db0d9
-
SSDEEP
1536:bLI1601g0ZqnIVGmG1mtxYDDd93qigXqF+ypK/Jf5nlfNVa5QvL0+LKr7Owj+oqi:bB01g0Zq9hDj3gEih9JA+LKrPj+os
Malware Config
Signatures
Files
-
1cd836d3ccb8d04d1770a42202dca2e37af9761b1f60d6af9577a0bac49796e0.dll windows x86
612a5ec1786ca5b7ef25ecc67eeb6054
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersionExW
GetModuleHandleW
lstrcpyA
lstrcatA
MultiByteToWideChar
ExpandEnvironmentStringsW
GetFileAttributesW
GetModuleFileNameW
lstrcmpW
lstrlenW
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InterlockedIncrement
GetLastError
InterlockedDecrement
GetUserDefaultLCID
CloseHandle
WaitForSingleObject
CreateEventW
SetEvent
GetSystemInfo
lstrcpyW
FormatMessageW
InterlockedExchange
GetSystemWindowsDirectoryW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
CreateProcessW
QueryPerformanceCounter
HeapAlloc
GetProcessHeap
HeapFree
HeapSetInformation
SetPriorityClass
GetCommandLineW
LocalFree
OutputDebugStringA
FreeLibrary
lstrlenA
Sleep
GetProcAddress
RaiseException
GetCurrentThread
GetCurrentProcess
LoadLibraryW
CreateSemaphoreW
ReleaseSemaphore
InterlockedCompareExchange
GlobalFree
GetCommandLineA
VirtualProtect
lstrcatW
GlobalAlloc
user32
PostThreadMessageW
MsgWaitForMultipleObjects
PeekMessageW
wsprintfA
advapi32
OpenThreadToken
RegQueryValueExW
DeregisterEventSource
RegEnumKeyExW
GetTokenInformation
RegLoadKeyW
AdjustTokenPrivileges
LookupPrivilegeValueW
RegEnumValueW
RegOpenKeyExW
RegDeleteKeyW
RegCreateKeyExW
RegSetValueExW
RegCloseKey
OpenProcessToken
ole32
StringFromCLSID
PropVariantClear
CoGetClassObject
CoTaskMemAlloc
CoRevertToSelf
CLSIDFromString
CoGetObject
CoCreateInstance
StringFromIID
IIDFromString
StringFromGUID2
CoSetProxyBlanket
CoImpersonateClient
CoUninitialize
CoInitializeEx
CoTaskMemFree
rpcrt4
NdrDllGetClassObject
NdrDllRegisterProxy
msvcr71
_onexit
__dllonexit
__CppXcptFilter
_initterm
_CxxThrowException
memcpy
_callnewh
wcscat
wcscpy
wcslen
wcstoul
_vsnwprintf
memset
free
_adjust_fdiv
malloc
iswctype
_itow
_local_unwind2
_except_handler3
Sections
.text Size: 56KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 36KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ