Static task
static1
Behavioral task
behavioral1
Sample
6d1392f57c105893d9f846580f5f6b4bd6ed0d571878c570d64fc34258d39785.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6d1392f57c105893d9f846580f5f6b4bd6ed0d571878c570d64fc34258d39785.dll
Resource
win10v2004-20220901-en
General
-
Target
6d1392f57c105893d9f846580f5f6b4bd6ed0d571878c570d64fc34258d39785
-
Size
132KB
-
MD5
73e58ba47a03007c94183afcd64d16d1
-
SHA1
75101514800699352c849e810507928e4f97c063
-
SHA256
6d1392f57c105893d9f846580f5f6b4bd6ed0d571878c570d64fc34258d39785
-
SHA512
92536e9ff663a58fda24d82c0d9c4c82d2748f6c75120a422367948947d303e697a69df78bf870ef46d8111722acbe29ddb8aaada0413e598f8ff8a84aee002e
-
SSDEEP
3072:wEBYDWkqvanyERnqxp4lmaD5XfWNXBp3rqH9n9GE:/Y61anymup2+xleH
Malware Config
Signatures
Files
-
6d1392f57c105893d9f846580f5f6b4bd6ed0d571878c570d64fc34258d39785.dll windows x86
4b8abd9b2dd87b0591cf000853d22927
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalAlloc
GetDriveTypeW
lstrlenW
GetCurrentProcess
GetProcAddress
OpenProcess
UnhandledExceptionFilter
GetProcessHeap
InterlockedIncrement
MultiByteToWideChar
GetACP
ExitProcess
HeapDestroy
SetHandleCount
GetFileType
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
WriteFile
InterlockedCompareExchange
Sleep
InterlockedExchange
LocalFree
GetLocaleInfoA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
HeapSize
GetCPInfo
GetOEMCP
GetLastError
GetStartupInfoA
GetModuleHandleA
VirtualQuery
GetSystemInfo
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
RtlUnwind
HeapFree
HeapAlloc
WideCharToMultiByte
GetVersionExA
LoadLibraryW
SetUnhandledExceptionFilter
TerminateProcess
FreeLibrary
WaitForSingleObject
LocalReAlloc
LoadLibraryA
CloseHandle
GetVersionExW
GetCommandLineA
VirtualProtect
user32
DestroyWindow
IsWindow
SetWindowPos
GetClientRect
EndDialog
FrameRect
DrawFocusRect
InflateRect
DrawEdge
OffsetRect
GetSysColor
FillRect
GetSysColorBrush
EnableWindow
IsDlgButtonChecked
SetDlgItemInt
SetFocus
ExitWindowsEx
GetDlgItemInt
GetWindowRect
ShowWindow
GetWindowTextA
GetFocus
MapWindowPoints
ReleaseDC
GetDC
GetWindowThreadProcessId
IsWindowVisible
SetDlgItemTextA
GetDlgItemTextA
GetDlgItem
MessageBeep
CheckDlgButton
advapi32
AdjustTokenPrivileges
OpenProcessToken
LookupPrivilegeValueW
RegCloseKey
gdi32
SelectObject
SetBkMode
SetTextColor
CreateSolidBrush
DeleteObject
Rectangle
SetROP2
SetBkColor
Sections
.text Size: 64KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 40KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ