DllGetClassObject
DllRegisterServer
PluginInit
RunObject
Behavioral task
behavioral1
Sample
8f49daaffb40244af268b3d727257d98127d9f141796a232287162872513fab2.dll
Resource
win7-20220812-en
Target
8f49daaffb40244af268b3d727257d98127d9f141796a232287162872513fab2.dll
Size
13KB
MD5
1043f8289ecb2d93be82dc3329e16b17
SHA1
1cc5c08c817eda114549fe727e2a59af1033255b
SHA256
8f49daaffb40244af268b3d727257d98127d9f141796a232287162872513fab2
SHA512
e6f2a6620cb40f8b1c1102ade67619b04c6146129a4decb18df6d9a832bccecf6c5855ec503fa698d01ab6a0dd72507be99dea2c7cc111368d3e3825e5f1d537
SSDEEP
192:sHVMfa7TTCjJSixzPSAA56RCK7Yu/VPgw3QOXBAQYfPq/3Kb:s1Mf0gJSix2AA56RCiZVCcGQYnq/6b
icedid
600996711
axilapodiumz.com
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
WinHttpCloseHandle
WinHttpOpen
WinHttpSendRequest
WinHttpConnect
WinHttpQueryHeaders
WinHttpReceiveResponse
WinHttpSetStatusCallback
WinHttpOpenRequest
WinHttpSetOption
WinHttpQueryDataAvailable
WinHttpReadData
wsprintfW
memset
SwitchToThread
CreateFileA
GetLastError
WideCharToMultiByte
lstrlenW
VirtualProtect
VirtualAlloc
lstrcatA
lstrcpyA
GetTempPathA
CreateDirectoryA
LoadLibraryA
GetProcAddress
GetComputerNameExW
Sleep
ExitProcess
CreateThread
HeapAlloc
HeapFree
GetProcessHeap
HeapReAlloc
WriteFile
CloseHandle
GetTickCount64
GetUserNameW
LookupAccountNameW
SHGetFolderPathA
DllGetClassObject
DllRegisterServer
PluginInit
RunObject
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE