Static task
static1
Behavioral task
behavioral1
Sample
7e4efa8efbda3a57cad5e3b918d2e6706a2e907c1cd81425a1f0c333bcb546db.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7e4efa8efbda3a57cad5e3b918d2e6706a2e907c1cd81425a1f0c333bcb546db.dll
Resource
win10v2004-20220812-en
General
-
Target
7e4efa8efbda3a57cad5e3b918d2e6706a2e907c1cd81425a1f0c333bcb546db
-
Size
112KB
-
MD5
904fee4889cc4f8440fe1af14cd4946e
-
SHA1
418c96850f0a812a1caea52973c1580beca9739f
-
SHA256
7e4efa8efbda3a57cad5e3b918d2e6706a2e907c1cd81425a1f0c333bcb546db
-
SHA512
00820977ebe7f3cfe2596154839a3199d5e943b4ff497f6dc0505871af4d766d59a22b1f9e2701e3fbbbcc0d63b9dd5df62ec4ae431c4456822a0bf6176135f1
-
SSDEEP
1536:+Nxxo+SP+kwLLsYOw6hvfQBMpcAR3O7L9KHNawzhamJUQsoVLVolbFYFcdYuQ:kxx/hkwLZOwgvfQr7WFamJLzVmlb/fQ
Malware Config
Signatures
Files
-
7e4efa8efbda3a57cad5e3b918d2e6706a2e907c1cd81425a1f0c333bcb546db.dll windows x86
67cacce98064a4dc5a9553da0aca60a2
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
wsprintfA
UpdateWindow
TranslateMessage
ShowWindow
SetRect
SetClipboardData
ScreenToClient
ReleaseDC
RegisterClassA
PostThreadMessageA
PeekMessageA
OpenClipboard
MsgWaitForMultipleObjects
LoadCursorA
GetSystemMetrics
GetQueueStatus
GetForegroundWindow
GetDC
EmptyClipboard
DispatchMessageA
DestroyWindow
DefWindowProcA
DefDlgProcW
CreateWindowExA
CloseClipboard
ClientToScreen
CharToOemA
AdjustWindowRect
advapi32
SetSecurityDescriptorDacl
RegQueryValueExA
RegOpenKeyExA
RegOpenKeyA
OpenProcessToken
InitializeSecurityDescriptor
InitializeAcl
GetSecurityDescriptorDacl
GetLengthSid
GetAce
EqualSid
ElfRegisterEventSourceA
CryptExportKey
CryptEnumProvidersW
AllocateAndInitializeSid
AddAce
AddAccessAllowedAce
StartServiceCtrlDispatcherA
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
winmm
waveInReset
waveInOpen
waveInGetNumDevs
waveInStart
sndPlaySoundA
joyGetPosEx
WOW32ResolveMultiMediaHandle
waveOutPrepareHeader
waveOutUnprepareHeader
waveInGetDevCapsW
timeKillEvent
shell32
ShellExecuteA
SHFileOperationW
SHGetSpecialFolderPathW
ws2_32
socket
send
select
inet_addr
getservbyname
connect
WSAGetLastError
WSAAsyncGetHostByName
WSAAccept
kernel32
WritePrivateProfileSectionW
TlsGetValue
WideCharToMultiByte
WaitForSingleObject
UpdateResourceA
GetFileInformationByHandle
GetModuleHandleA
TlsFree
AddConsoleAliasW
BackupRead
BackupSeek
CloseHandle
CompareStringA
CreateDirectoryExA
CreateFileA
CreateSemaphoreA
DeleteCriticalSection
EnumLanguageGroupLocalesA
ExitProcess
GetCommandLineA
GetCompressedFileSizeW
GetConsoleMode
GetConsoleOutputCP
GetCurrentProcessId
WritePrivateProfileStructW
SetEnvironmentVariableA
RemoveDirectoryW
MulDiv
LeaveCriticalSection
IsBadHugeWritePtr
HeapFree
HeapCreate
HeapAlloc
GetSystemInfo
GlobalMemoryStatus
GlobalAlloc
GetWindowsDirectoryA
GetVersionExA
GetTempPathW
GetExitCodeProcess
dinput
DirectInputCreateW
ole32
IsEqualGUID
PropVariantClear
CoUninitialize
Sections
.text Size: 76KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ