EVJVY
Static task
static1
Behavioral task
behavioral1
Sample
3842b6179ebf633540ba5d52e5def8c3ed4e5a68f5d87c20b17f10719747e17d.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3842b6179ebf633540ba5d52e5def8c3ed4e5a68f5d87c20b17f10719747e17d.dll
Resource
win10v2004-20220901-en
General
-
Target
3842b6179ebf633540ba5d52e5def8c3ed4e5a68f5d87c20b17f10719747e17d
-
Size
480KB
-
MD5
809d4f37ebd6edaa7f9ebb37b81e0de0
-
SHA1
eff4b1b07adf8a0cc53cd09b96e7087ff5a6539c
-
SHA256
3842b6179ebf633540ba5d52e5def8c3ed4e5a68f5d87c20b17f10719747e17d
-
SHA512
a6e33b04cd1bdd43dddf9daf4eec4270f6edbc8e7bcaa67ed632e9cdb23fd022b49e90e1b04452708b7e778f5ffbb6acb8e32a908048a42dc4bab06daa765034
-
SSDEEP
6144:+AVHTwVgt+zhto3HEuEL+KM/09lHqyxG+giqWC4fQ:+IwVThtCcL+KMsvHqyOWRY
Malware Config
Signatures
Files
-
3842b6179ebf633540ba5d52e5def8c3ed4e5a68f5d87c20b17f10719747e17d.dll windows x86
64e702b9a7eac605c3f655119ff3213c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
lstrcatA
lstrcpyA
GlobalUnlock
GlobalLock
GlobalAlloc
LeaveCriticalSection
CreateFileA
CloseHandle
UnmapViewOfFile
MapViewOfFile
OpenFileMappingA
FreeLibrary
DisableThreadLibraryCalls
GetCurrentProcessId
GetModuleHandleA
GetProcAddress
SetFilePointer
VirtualProtect
user32
GetWindowThreadProcessId
IsWindowVisible
IsWindow
GetTopWindow
CallNextHookEx
GetKeyState
RegisterClassExA
GetClassNameA
GetClassInfoExA
SetParent
SetWindowPos
OpenClipboard
SetClipboardData
GetWindow
SendDlgItemMessageA
wsprintfA
GetDlgItemTextA
SetDlgItemTextA
IsDlgButtonChecked
CheckDlgButton
EnableWindow
SetWindowTextA
ShowWindow
DestroyWindow
PostQuitMessage
GetWindowTextA
KillTimer
GetDlgItem
SendMessageA
GetWindowRect
CloseClipboard
MapWindowPoints
EmptyClipboard
advapi32
RegSetValueExA
RegOpenKeyA
RegCloseKey
comctl32
ord17
msvcrt
free
strstr
atoi
_beginthread
sprintf
??3@YAXPAX@Z
??2@YAPAXI@Z
malloc
_adjust_fdiv
_itoa
_initterm
ws2_32
send
shlwapi
PathRemoveFileSpecA
Exports
Exports
Sections
.EVJVYQ Size: 224KB - Virtual size: 222KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text0 Size: 56KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text1 Size: 132KB - Virtual size: 129KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 52KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ