Odjkdibk
Static task
static1
Behavioral task
behavioral1
Sample
6740951d3a5cd6882230aa0f86d5336e465cbc3f498de47ca4d6e7d5bec6ea67.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6740951d3a5cd6882230aa0f86d5336e465cbc3f498de47ca4d6e7d5bec6ea67.dll
Resource
win10v2004-20220812-en
General
-
Target
6740951d3a5cd6882230aa0f86d5336e465cbc3f498de47ca4d6e7d5bec6ea67
-
Size
316KB
-
MD5
902a471e1b303445071ca4d562e1af00
-
SHA1
25fcb170293a6f7c29a193fd06cf9d414fb62866
-
SHA256
6740951d3a5cd6882230aa0f86d5336e465cbc3f498de47ca4d6e7d5bec6ea67
-
SHA512
02fc94c36f4e251ce5ac02fca79b8c89f6395a2654a6406c0e74b85f43abc90399f8a35b5096dfed3e6b4de34d5b88259f0ef03e875a46a92a21f202d33373a0
-
SSDEEP
3072:QvlLqknarFs5Cy61iX/Lk+AOm65kq7dLizE50QXFBdjYwS/4gyYeglBN8HEjB1oO:QvlNPCykiX/w+A05V78E1T2ZyhCr7X
Malware Config
Signatures
Files
-
6740951d3a5cd6882230aa0f86d5336e465cbc3f498de47ca4d6e7d5bec6ea67.dll windows x86
2aac5b05dfb64d0dd8c2fee5209743b8
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
PolyTextOutW
AddFontMemResourceEx
DeleteMetaFile
kernel32
EnumResourceNamesW
GetCurrentDirectoryW
UnregisterWait
VirtualAlloc
GetCurrentProcess
GetFileAttributesW
GetLocalTime
GetModuleFileNameW
GetModuleHandleA
GetNamedPipeInfo
GetProcAddress
GetVersion
GetVolumeNameForVolumeMountPointA
InterlockedCompareExchange
InterlockedExchange
SetUnhandledExceptionFilter
Sleep
TerminateProcess
UnhandledExceptionFilter
DisableThreadLibraryCalls
GetProcessHeap
GetProcessWorkingSetSize
CloseHandle
CreateFileW
GetLocaleInfoA
LocalAlloc
LocalFree
lstrcatW
lstrlenW
RtlUnwind
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
GetLastError
InterlockedDecrement
GetCurrentThread
ExitProcess
SetStdHandle
EnterCriticalSection
LeaveCriticalSection
GetFileType
HeapFree
GetCommandLineA
GetVersionExA
HeapAlloc
RaiseException
DeleteCriticalSection
FatalAppExitA
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
IsDebuggerPresent
CompareStringA
MultiByteToWideChar
CompareStringW
WriteFile
GetStdHandle
GetModuleFileNameA
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryA
InitializeCriticalSection
GetStringTypeA
GetStringTypeW
SetHandleCount
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
HeapReAlloc
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
LCMapStringA
LCMapStringW
SetFilePointer
GetConsoleCP
GetConsoleMode
GetLocaleInfoW
GetTimeZoneInformation
FlushFileBuffers
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
SetEnvironmentVariableW
CreateFileA
ReadFile
oleaut32
VarCyMul
OleIconToCursor
VarDecFix
rpcrt4
I_RpcBindingInqDynamicEndpointA
RpcSmEnableAllocate
RpcProtseqVectorFreeA
Exports
Exports
Sections
.text Size: 212KB - Virtual size: 210KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 52KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ