Static task
static1
Behavioral task
behavioral1
Sample
5736915bce66db8868fb0f43058deb347f0af1b63d442dc26f731195ff77589d.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5736915bce66db8868fb0f43058deb347f0af1b63d442dc26f731195ff77589d.dll
Resource
win10v2004-20220812-en
General
-
Target
5736915bce66db8868fb0f43058deb347f0af1b63d442dc26f731195ff77589d
-
Size
132KB
-
MD5
6350d16973f46ea813801db51a6ceb82
-
SHA1
65594ad40c3af4af55540d18e7adab593f1b1548
-
SHA256
5736915bce66db8868fb0f43058deb347f0af1b63d442dc26f731195ff77589d
-
SHA512
506e1c1f77b8356b88712a4a6405d2a1e544db209a3f4e3bf27c4cc7c70504080d33d800148c13a9cc94285aaa25e3dba694d3e5c8fb3d9092ca83b116a68c70
-
SSDEEP
3072:wZOYDWkwZanNERnqa2p4lmaD5XfWNXBp3rqC9n9GE:HY6xanNmap2+xleC
Malware Config
Signatures
Files
-
5736915bce66db8868fb0f43058deb347f0af1b63d442dc26f731195ff77589d.dll windows x86
4b8abd9b2dd87b0591cf000853d22927
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalAlloc
GetDriveTypeW
lstrlenW
GetCurrentProcess
GetProcAddress
OpenProcess
UnhandledExceptionFilter
GetProcessHeap
InterlockedIncrement
MultiByteToWideChar
GetACP
ExitProcess
HeapDestroy
SetHandleCount
GetFileType
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
WriteFile
InterlockedCompareExchange
Sleep
InterlockedExchange
LocalFree
GetLocaleInfoA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
HeapSize
GetCPInfo
GetOEMCP
GetLastError
GetStartupInfoA
GetModuleHandleA
VirtualQuery
GetSystemInfo
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
RtlUnwind
HeapFree
HeapAlloc
WideCharToMultiByte
GetVersionExA
LoadLibraryW
SetUnhandledExceptionFilter
TerminateProcess
FreeLibrary
WaitForSingleObject
LocalReAlloc
LoadLibraryA
CloseHandle
GetVersionExW
GetCommandLineA
VirtualProtect
user32
DestroyWindow
IsWindow
SetWindowPos
GetClientRect
EndDialog
FrameRect
DrawFocusRect
InflateRect
DrawEdge
OffsetRect
GetSysColor
FillRect
GetSysColorBrush
EnableWindow
IsDlgButtonChecked
SetDlgItemInt
SetFocus
ExitWindowsEx
GetDlgItemInt
GetWindowRect
ShowWindow
GetWindowTextA
GetFocus
MapWindowPoints
ReleaseDC
GetDC
GetWindowThreadProcessId
IsWindowVisible
SetDlgItemTextA
GetDlgItemTextA
GetDlgItem
MessageBeep
CheckDlgButton
advapi32
AdjustTokenPrivileges
OpenProcessToken
LookupPrivilegeValueW
RegCloseKey
gdi32
SelectObject
SetBkMode
SetTextColor
CreateSolidBrush
DeleteObject
Rectangle
SetROP2
SetBkColor
Sections
.text Size: 64KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 40KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ