Iedtdngpb
Static task
static1
Behavioral task
behavioral1
Sample
11bb4e253334ae64e81a2ea65712bd6811baa5a0376ea10b7c5e0a79c9f2a781.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
11bb4e253334ae64e81a2ea65712bd6811baa5a0376ea10b7c5e0a79c9f2a781.dll
Resource
win10v2004-20220812-en
General
-
Target
11bb4e253334ae64e81a2ea65712bd6811baa5a0376ea10b7c5e0a79c9f2a781
-
Size
242KB
-
MD5
a029ab34b541912e008a632b3d60fcd4
-
SHA1
b8e7d5ba2275af67f71afb72bbcd19051f696fa1
-
SHA256
11bb4e253334ae64e81a2ea65712bd6811baa5a0376ea10b7c5e0a79c9f2a781
-
SHA512
918b3d04831832f352e538208fca3353bd594fd8209c61ea20da96ae478a053af3e98a8dbd24e8d3a9dbad96ebc4f3babe10abca97116156242bbb0615dcd77a
-
SSDEEP
6144:Pcg5QF8Scxq+5zUHiL1uCj542/9BiuG3Tg9:EgY8ScxqWIHi4Cjea9/I
Malware Config
Signatures
Files
-
11bb4e253334ae64e81a2ea65712bd6811baa5a0376ea10b7c5e0a79c9f2a781.dll windows x86
82a2ff72e64b240461d928f5e0cb996f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
ExitThread
GetCommandLineA
GetConsoleCP
GetCurrentProcessId
GetCurrentThreadId
GetModuleHandleA
GetStartupInfoA
GetSystemTimeAsFileTime
GetTickCount
HeapAlloc
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
QueryPerformanceCounter
ReadFile
ResumeThread
SetUnhandledExceptionFilter
VirtualAlloc
VirtualProtect
lstrcmpiA
lstrcpynA
msvcrt
strlen
strcmp
atof
sscanf
fseek
fopen
swprintf
user32
SetPropA
GetMenu
CheckMenuRadioItem
GetUserObjectSecurity
comctl32
CreateMappedBitmap
CreateStatusWindowA
CreateToolbarEx
DrawStatusTextA
InitCommonControls
CreatePropertySheetPageA
Exports
Exports
Sections
.text Size: 108KB - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 75KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 39KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ