pedpzdgf
Static task
static1
Behavioral task
behavioral1
Sample
ee3be897a81935d8a9c356beec88a55515b45341f7cd57ec3a38ed82efa8b5fc.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ee3be897a81935d8a9c356beec88a55515b45341f7cd57ec3a38ed82efa8b5fc.dll
Resource
win10v2004-20220812-en
General
-
Target
ee3be897a81935d8a9c356beec88a55515b45341f7cd57ec3a38ed82efa8b5fc
-
Size
84KB
-
MD5
7d477a7aa812e642319affb252ede21b
-
SHA1
e2fddc233f7b646f2d6225b592a72d35333109ea
-
SHA256
ee3be897a81935d8a9c356beec88a55515b45341f7cd57ec3a38ed82efa8b5fc
-
SHA512
3e1f8a00b8b0e6768c00c620a554a1ddd0b4fe2e661fb6457070c62f1344d3a4958b997cde619050b2aa708e9a998d4737bcfd682781a4f3bedde23980359b07
-
SSDEEP
1536:6Kf72ygJvMWE6XmTuM6DN80fFkWGq6cjTA:Fz2yUvBE6XmVOjdkWGqzjTA
Malware Config
Signatures
Files
-
ee3be897a81935d8a9c356beec88a55515b45341f7cd57ec3a38ed82efa8b5fc.dll windows x86
c3016792476bcd1a8dd9ce5248111d19
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindAtomA
GetCurrencyFormatA
GetFileInformationByHandle
GetVersionExA
EnumCalendarInfoExA
HeapFree
GetProcessHeap
HeapAlloc
ExitThread
Beep
ExitProcess
gdi32
MoveToEx
SetROP2
GetLayout
SetLayout
GetDeviceCaps
DeleteObject
LineTo
CreatePen
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
SetDIBitsToDevice
GetStockObject
DeleteDC
Exports
Exports
Sections
.text Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 964B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 408B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ