IXNNJE
Static task
static1
Behavioral task
behavioral1
Sample
35966467d06e40dfbb8f44f87ed554aa8f2bdb167ca04dad6d193dd1d8b78702.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
35966467d06e40dfbb8f44f87ed554aa8f2bdb167ca04dad6d193dd1d8b78702.dll
Resource
win10v2004-20220901-en
General
-
Target
35966467d06e40dfbb8f44f87ed554aa8f2bdb167ca04dad6d193dd1d8b78702
-
Size
152KB
-
MD5
643e7ca9550a4d2188a02590c15283bc
-
SHA1
004b148a8cd114e51b905a0ffc4e86fd02d59133
-
SHA256
35966467d06e40dfbb8f44f87ed554aa8f2bdb167ca04dad6d193dd1d8b78702
-
SHA512
2a8e162d14f2bf46c1a06dc6512382090cc04574327ad9ac78221788d9f5958b01be577a004b77e274a7f6b7b06df80cb915bc4229e76e8680aaf5dcac62eb56
-
SSDEEP
3072:t0rEBbrn9CunLmh1h66+/QRI4R4pNzuaVonS7cUVh13yGNu4LmGecoRM:t/PIh1kQqJpNsSZVh13Xu4LmGecP
Malware Config
Signatures
Files
-
35966467d06e40dfbb8f44f87ed554aa8f2bdb167ca04dad6d193dd1d8b78702.dll windows x86
129d85f71bacd86a2daf5f41de030108
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
EqualSid
RegQueryInfoKeyA
RegCreateKeyExA
RegEnumValueA
RegQueryInfoKeyW
RegEnumKeyExA
LookupPrivilegeValueA
RegSetValueExW
LookupAccountSidW
RegSetValueExA
ChangeServiceConfigA
AllocateAndInitializeSid
RegDeleteKeyW
UnlockServiceDatabase
InitializeSecurityDescriptor
RegDeleteValueW
RegQueryValueExW
RegQueryValueW
RegQueryValueExA
RegOpenKeyExW
RegFlushKey
RegCreateKeyW
RegDeleteValueA
RegOpenKeyExA
FreeSid
GetTokenInformation
CloseServiceHandle
ChangeServiceConfig2A
RegCloseKey
RegCreateKeyExW
GetSecurityDescriptorControl
LockServiceDatabase
RegEnumKeyExW
version
GetFileVersionInfoW
GetFileVersionInfoSizeA
GetFileVersionInfoSizeW
VerQueryValueW
kernel32
RtlUnwind
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetProcAddress
IsValidLocale
LoadLibraryA
GetModuleHandleA
GetHandleInformation
CreateProcessA
CreateMutexA
lstrcatA
lstrlenW
lstrcpynW
LocalFree
GlobalHandle
GetSystemTimeAsFileTime
LockResource
HeapCreate
ExpandEnvironmentStringsA
GetCurrentThreadId
SetThreadPriority
SetCurrentDirectoryA
LocalAlloc
HeapSize
CreateFileA
GetLocaleInfoW
GetSystemTime
GlobalReAlloc
WriteConsoleW
GlobalFree
lstrcpyA
WriteConsoleA
WaitForSingleObject
SetPriorityClass
CompareStringW
RaiseException
CreateProcessW
GetConsoleMode
FormatMessageA
GlobalUnlock
GetTickCount
CompareStringA
WriteFile
GetCPInfo
CreateDirectoryW
SetFilePointer
CreateFileW
IsBadReadPtr
VirtualAlloc
ExitProcess
HeapAlloc
GetCommandLineA
GetVersion
HeapDestroy
VirtualFree
HeapFree
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
FatalAppExitA
HeapReAlloc
IsBadWritePtr
TerminateProcess
GetCurrentProcess
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
GetCurrentThread
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
CloseHandle
UnhandledExceptionFilter
GetACP
GetOEMCP
FlushFileBuffers
SetStdHandle
SetEndOfFile
ReadFile
MultiByteToWideChar
Exports
Exports
Sections
.text Size: 76KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 52KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ