QueryObj
Static task
static1
Behavioral task
behavioral1
Sample
dadc2219ea6d2b98caa34567acb72081bf190d5485abad92a86dfec74fc20b1c.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dadc2219ea6d2b98caa34567acb72081bf190d5485abad92a86dfec74fc20b1c.dll
Resource
win10v2004-20220812-en
General
-
Target
dadc2219ea6d2b98caa34567acb72081bf190d5485abad92a86dfec74fc20b1c
-
Size
152KB
-
MD5
47dc78ff9b01932eb1c4aed4315ab424
-
SHA1
c3cd13fa74d3b85d882ea1c4f2b8bd2294000640
-
SHA256
dadc2219ea6d2b98caa34567acb72081bf190d5485abad92a86dfec74fc20b1c
-
SHA512
ff2a20d2830e623eccd8939f377d38bcbd12a8ac36adfee412e3b86ac807c2115911f8267c1179cb324a8b7f4fb388ed8933c0faeded09c37e6c1e9e986ce8fe
-
SSDEEP
3072:2zKbMnMXPADnUtwuWsIeGyqNKN4yRtonZQ3mawLwfWoS:2wQUGuWeGE6QWawLwfWd
Malware Config
Signatures
Files
-
dadc2219ea6d2b98caa34567acb72081bf190d5485abad92a86dfec74fc20b1c.dll windows x86
63e014c618b8093ab92e71debbb977f7
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcatA
FreeLibrary
GetProcAddress
LoadLibraryA
DeleteFileA
GetTempPathA
GetPrivateProfileIntA
GetCurrentDirectoryA
GetModuleFileNameA
GetTickCount
GetShortPathNameA
WritePrivateProfileSectionA
CopyFileA
GetPrivateProfileSectionA
WritePrivateProfileStringA
GetExitCodeProcess
GetWindowsDirectoryA
GetVersionExA
CreateProcessA
Sleep
FindClose
FindNextFileA
FindFirstFileA
WinExec
GetFileAttributesA
GetPrivateProfileStringA
LockResource
LoadResource
FindResourceA
GetModuleHandleA
RemoveDirectoryA
OpenMutexA
GetVersion
lstrcpyA
CreateDirectoryA
MultiByteToWideChar
WaitForSingleObject
CloseHandle
GetLocalTime
WideCharToMultiByte
LCMapStringA
SetLastError
TlsGetValue
CompareStringA
FlushFileBuffers
SetStdHandle
TlsFree
RaiseException
VirtualQuery
CreateFileA
GetFileSize
ReadFile
SetEndOfFile
GetCurrentProcessId
SetEnvironmentVariableA
CompareStringW
RtlUnwind
GetTimeZoneInformation
GetSystemTime
lstrlenA
InterlockedDecrement
InterlockedIncrement
GetCommandLineA
HeapFree
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ExitProcess
GetCPInfo
GetACP
GetOEMCP
HeapAlloc
GetCurrentThreadId
TlsSetValue
TlsAlloc
SetFilePointer
FreeEnvironmentStringsW
GetLastError
LCMapStringW
TerminateProcess
GetCurrentProcess
HeapReAlloc
HeapSize
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
VirtualAlloc
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
WriteFile
IsBadWritePtr
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
user32
GetWindowLongA
FindWindowA
IsWindow
SendMessageA
PostMessageA
IsWindowVisible
IsWindowEnabled
GetWindow
advapi32
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegDeleteValueA
shell32
ShellExecuteA
wininet
HttpSendRequestA
InternetOpenA
InternetConnectA
HttpOpenRequestA
HttpQueryInfoA
InternetCloseHandle
Exports
Exports
Sections
.text Size: 96KB - Virtual size: 95KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ