Static task
static1
Behavioral task
behavioral1
Sample
ae29c918bd506f80f51badc1f4381cca629fc7f1e3049461e36e880b5fcbdb75.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ae29c918bd506f80f51badc1f4381cca629fc7f1e3049461e36e880b5fcbdb75.dll
Resource
win10v2004-20220812-en
General
-
Target
ae29c918bd506f80f51badc1f4381cca629fc7f1e3049461e36e880b5fcbdb75
-
Size
152KB
-
MD5
924f00deade51bcdf64962b119c3ccb7
-
SHA1
7cf9ac95ebea2238825c9d7c191e2a077ee36b56
-
SHA256
ae29c918bd506f80f51badc1f4381cca629fc7f1e3049461e36e880b5fcbdb75
-
SHA512
76bf967441e26602603c698a1aa210c5c5c961158719cd6d19fd84fc78fd80bd88ded66aa7d57b30c7c535c38b8ad95fcc8f3b53bb7e51ee79d85a15927293ef
-
SSDEEP
3072:QeLz+NjkZZQUz78v3yDEMDz8GRzT0FnEUeRfqFfTAKO6C6BLLnK8J/ufUYpu5CX:4NjG7Qv3rMDzpvfZQ/q6FKhM
Malware Config
Signatures
Files
-
ae29c918bd506f80f51badc1f4381cca629fc7f1e3049461e36e880b5fcbdb75.dll windows x86
2404c1de32627db631d52c97823650c8
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcessHeap
WideCharToMultiByte
LocalAlloc
LocalFree
SetLastError
InterlockedCompareExchange
GetVersionExW
Sleep
FreeLibrary
CreateThread
CreateEventW
InterlockedIncrement
InterlockedDecrement
CreateFileW
LoadLibraryW
GetCurrentProcessId
lstrcmpW
WaitForSingleObject
ReleaseMutex
CreateProcessW
CreateMutexW
GetTempFileNameW
GetTempPathW
SetEndOfFile
GetFileSize
DeleteFileW
ReadFile
SetFilePointer
HeapDestroy
HeapCreate
RemoveDirectoryW
GetCurrentThreadId
SetFileAttributesW
InterlockedExchange
TerminateProcess
UnhandledExceptionFilter
HeapFree
VirtualFree
CreateDirectoryW
FlushFileBuffers
GetLocalTime
DefineDosDeviceW
SetEvent
DeleteCriticalSection
InitializeCriticalSection
DisableThreadLibraryCalls
IsBadReadPtr
IsBadWritePtr
MapViewOfFile
CreateFileMappingW
GetFileAttributesW
lstrcatW
UnmapViewOfFile
GlobalReAlloc
GlobalHandle
GlobalFree
lstrlenA
IsBadCodePtr
lstrcpyW
GetSystemDirectoryW
CopyFileW
lstrcmpiW
lstrcpyA
GlobalAlloc
GlobalLock
GlobalUnlock
MulDiv
GetCurrentProcess
FlushInstructionCache
MultiByteToWideChar
LeaveCriticalSection
EnterCriticalSection
FindResourceExW
HeapAlloc
GetProcAddress
LoadLibraryA
VirtualAlloc
OutputDebugStringA
GetModuleHandleW
CloseHandle
SetUnhandledExceptionFilter
GetLastError
LoadResource
LockResource
SizeofResource
lstrlenW
WriteFile
FindFirstFileW
FindNextFileW
FindClose
GetTickCount
GetCommandLineA
MoveFileExW
VirtualProtect
user32
FillRect
EndPaint
BeginPaint
GetClassInfoExW
LoadCursorW
RegisterClassExW
CreateAcceleratorTableW
SetWindowTextW
GetWindowTextW
RegisterWindowMessageW
ReleaseDC
GetDC
GetClientRect
DefWindowProcW
SendMessageW
CreateWindowExW
SetWindowLongW
LoadStringW
TranslateMessage
DispatchMessageW
GetParent
IsWindow
GetFocus
SendNotifyMessageW
SetFocus
wsprintfA
CharPrevW
CharNextW
RedrawWindow
GetMessageW
advapi32
GetSidSubAuthorityCount
StartServiceW
OpenSCManagerW
OpenServiceW
RegConnectRegistryW
LsaFreeMemory
RegQueryInfoKeyW
RegCreateKeyW
RegOpenKeyW
GetSidSubAuthority
RegCloseKey
RegCreateKeyExW
RegDeleteValueW
RegQueryValueExW
RegEnumValueW
CloseServiceHandle
RegOpenKeyExW
RegSetValueExW
RegDeleteKeyW
LookupAccountSidW
ChangeServiceConfigW
gdi32
CreateSolidBrush
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
DeleteObject
DeleteDC
GetDeviceCaps
ole32
CoUninitialize
CoCreateInstance
CoTaskMemAlloc
CoGetClassObject
CLSIDFromProgID
CLSIDFromString
CreateStreamOnHGlobal
CoTaskMemFree
CoInitialize
rpcrt4
RpcRevertToSelf
RpcAsyncInitializeHandle
RpcMgmtIsServerListening
RpcStringFreeW
RpcBindingSetAuthInfoExW
NdrClientCall2
RpcStringBindingComposeW
RpcBindingFromStringBindingW
msvcrt
wcspbrk
_adjust_fdiv
_initterm
_ftol
floor
swprintf
memcpy
_vsnwprintf
_amsg_exit
wcsrchr
wcsncmp
printf
_XcptFilter
_ismbblead
exit
malloc
realloc
_errno
_lock
free
calloc
memset
wcscpy
_snwprintf
wcsncpy
strncpy
strchr
_vsnprintf
sprintf
memmove
wcslen
wcscat
wcscmp
wcschr
_wcsicmp
_wcsnicmp
_except_handler3
??3@YAXPAX@Z
__CxxFrameHandler
msvcp60
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@0@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@PBD@Z
??8std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@0@Z
??Mstd@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@0@Z
??Ostd@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@0@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
Sections
.text Size: 102KB - Virtual size: 102KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 34KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ