Static task
static1
Behavioral task
behavioral1
Sample
aa72468ee166e9ec2c02ced4a373158d20353fb3c6e2886595f228d2e0a37fd4.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
aa72468ee166e9ec2c02ced4a373158d20353fb3c6e2886595f228d2e0a37fd4.dll
Resource
win10v2004-20220812-en
General
-
Target
aa72468ee166e9ec2c02ced4a373158d20353fb3c6e2886595f228d2e0a37fd4
-
Size
115KB
-
MD5
6d40b0943d2a032ccc4b785e765251e0
-
SHA1
48f4c8cbe40bf84eb46063a5cff90a94743e141d
-
SHA256
aa72468ee166e9ec2c02ced4a373158d20353fb3c6e2886595f228d2e0a37fd4
-
SHA512
e9e2f4c51dd51833a9b2a1bf4f6e1580caadca3a9f2099922ada654ccf2d3fef572570e76bd9573d7c253b2afb3f5cf69ca580d65cd9c59be5c76d95b4e4df9e
-
SSDEEP
3072:KklOwr9THSepyZfYtGifUPliwd2QqpMf+:j46JlYfYBcPlb2QB+
Malware Config
Signatures
Files
-
aa72468ee166e9ec2c02ced4a373158d20353fb3c6e2886595f228d2e0a37fd4.dll windows x86
d056332cf3b8d6b9c5dfda1fdbccf8ca
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcr90
_lock
__dllonexit
_except_handler4_common
_unlock
__clean_type_info_names_internal
_crt_debugger_hook
__CppXcptFilter
_adjust_fdiv
_amsg_exit
_initterm_e
_initterm
_decode_pointer
_encoded_null
free
_malloc_crt
_onexit
_encode_pointer
kernel32
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
InterlockedCompareExchange
Sleep
InterlockedExchange
GetSystemTimeAsFileTime
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 864B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text Size: 108KB - Virtual size: 108KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE