Static task
static1
Behavioral task
behavioral1
Sample
9a78c58d515e501abd5f93d196f8452c1a62736454b7313e8ee26d1fbd20b0d2.dll
Resource
win7-20220901-en
General
-
Target
9a78c58d515e501abd5f93d196f8452c1a62736454b7313e8ee26d1fbd20b0d2
-
Size
497KB
-
MD5
91e468a26d3874218232010daf7242fe
-
SHA1
99d849b7b1949ce57d08baa46873aecb5cc6f304
-
SHA256
9a78c58d515e501abd5f93d196f8452c1a62736454b7313e8ee26d1fbd20b0d2
-
SHA512
baf343f5e5f74179450071521e56eb0fbefff00c815ca01626185442e5b16438334eef44f59f3846a880658ca3af65df45b39353e8e3fbcc8bd41aa581e49c77
-
SSDEEP
12288:xNrMi/MhNrcnzlElRcsUhOsyG3s1AsEOO:/D/MhNgyRc5sJYns
Malware Config
Signatures
Files
-
9a78c58d515e501abd5f93d196f8452c1a62736454b7313e8ee26d1fbd20b0d2.dll windows x86
fd7770b00560b7478a4a8ef8ad9cae37
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
LookupPrivilegeValueA
AdjustTokenPrivileges
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
OpenProcessToken
user32
wsprintfA
kernel32
IsValidLocale
EnumSystemLocalesA
GetCurrentProcess
GetLastError
GetVersionExA
GetProcAddress
GetModuleHandleA
CreateRemoteThread
WaitForSingleObject
VirtualAllocEx
WriteProcessMemory
VirtualFreeEx
CloseHandle
CreateProcessA
ExitProcess
LoadLibraryA
GetSystemDirectoryA
CreateFileA
GetFileTime
SetFileTime
GetStartupInfoA
CopyFileA
FindResourceA
SizeofResource
LoadResource
LockResource
GetTempPathA
GetTempFileNameA
DeleteFileA
GetCurrentThreadId
DecodePointer
GetCommandLineA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
RtlUnwind
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
HeapFree
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetModuleHandleW
SetLastError
InterlockedDecrement
GetCurrentThread
Sleep
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoW
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
HeapDestroy
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
FatalAppExitA
SetFilePointer
WriteConsoleW
MultiByteToWideChar
SetStdHandle
FlushFileBuffers
IsProcessorFeaturePresent
HeapAlloc
HeapReAlloc
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
LoadLibraryW
GetLocaleInfoW
GetModuleFileNameW
LCMapStringW
GetStringTypeW
SetEndOfFile
GetProcessHeap
ReadFile
CreateFileW
HeapSize
GetUserDefaultLCID
GetLocaleInfoA
Sections
.text Size: 65KB - Virtual size: 65KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 409KB - Virtual size: 408KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ