Static task
static1
Behavioral task
behavioral1
Sample
084addbea06f33b80ecc0aa2223151ce8e535ab9ba828594d879cceb738727c5.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
084addbea06f33b80ecc0aa2223151ce8e535ab9ba828594d879cceb738727c5.dll
Resource
win10v2004-20220812-en
General
-
Target
084addbea06f33b80ecc0aa2223151ce8e535ab9ba828594d879cceb738727c5
-
Size
23KB
-
MD5
611e060bacc3395dd9e9e11b53cd8f55
-
SHA1
830a980de1119e773c23ef407558de776f9b064e
-
SHA256
084addbea06f33b80ecc0aa2223151ce8e535ab9ba828594d879cceb738727c5
-
SHA512
2e837962acc4a835a434174b8729512ab6213682c3f549b01628418d6facbf7e115c22139b6248b1b65dbd41f2f757bc844d22dfb6877d11647f35b4a176a3ef
-
SSDEEP
384:r18qjY4RmKUgXTmRN/SkURhj3zQtEy9EXsXwC/3AH3n+:r1z0YBTmRN/SVvj3z3dcwlX+
Malware Config
Signatures
Files
-
084addbea06f33b80ecc0aa2223151ce8e535ab9ba828594d879cceb738727c5.dll windows x86
6e46604f926601fc02bddfdf264d590f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetACP
IsDBCSLeadByte
LoadLibraryA
InterlockedDecrement
InterlockedExchange
GetProcAddress
GetVersionExA
GetStartupInfoA
GetUserDefaultLCID
VirtualAlloc
VirtualProtect
Sleep
IsDebuggerPresent
GetComputerNameA
GetCurrentThreadId
GetCurrentProcess
IsBadWritePtr
IsBadReadPtr
GetVersion
user32
GetWindowRect
GetClientRect
GetWindowTextLengthA
IsCharLowerA
IsCharUpperA
IsCharAlphaNumericA
IsCharAlphaA
GetWindowDC
GetForegroundWindow
GetAncestor
GetTitleBarInfo
GetWindow
GetLastActivePopup
GetWindowInfo
IsZoomed
IsMenu
GetWindowPlacement
GetGUIThreadInfo
IsWindowUnicode
advapi32
IsValidSecurityDescriptor
IsValidAcl
GetUserNameA
msvcrt
_adjust_fdiv
malloc
_initterm
free
memmove
_set_error_mode
div
_CIfmod
frexp
_CIsinh
_isctype
_pctype
_hypot
time
ldexp
floor
__mb_cur_max
gdi32
GetBkMode
GetStretchBltMode
GetPixel
ole32
CoGetCurrentProcess
CoFileTimeNow
CoRevertToSelf
shell32
ord524
ord66
ord680
Sections
.text Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 69KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ