Static task
static1
Behavioral task
behavioral1
Sample
72d4efe52674c3d30c310b0313078c05134ec712d1acbb867fb3fe665ae1a00f.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
72d4efe52674c3d30c310b0313078c05134ec712d1acbb867fb3fe665ae1a00f.dll
Resource
win10v2004-20220901-en
General
-
Target
72d4efe52674c3d30c310b0313078c05134ec712d1acbb867fb3fe665ae1a00f
-
Size
857KB
-
MD5
166bdfe93ba0577c280f2b0c55d4ae69
-
SHA1
822c35bf5dc6f6110a0717c5eb04292fbea17d6a
-
SHA256
72d4efe52674c3d30c310b0313078c05134ec712d1acbb867fb3fe665ae1a00f
-
SHA512
f8b54a2bda05f10d41ac108b478635d0318024310b4aee4bbd35f27826f3ea73716c2aba8af96e699afaf5833991a0d31021664b3d3a3910b2fd1233d0557ba4
-
SSDEEP
24576:h6N5uawBHJOXN49xm9dBZH7RJCU9PQc0YGFmTXF9njC:kN8awlJW634YU9QcQ8XF9njC
Malware Config
Signatures
Files
-
72d4efe52674c3d30c310b0313078c05134ec712d1acbb867fb3fe665ae1a00f.dll windows x86
60581e3d0ca17cc5e41ae37baa9d48aa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleW
GetCurrentProcess
FormatMessageW
GetSystemDirectoryW
GetQueuedCompletionStatus
HeapSetInformation
GetSystemTime
DeleteCriticalSection
GetStartupInfoW
EnterCriticalSection
LocalFree
CreateMutexW
HeapAlloc
CreateThread
GetTickCount
GetCurrentProcessId
LoadLibraryExA
FreeLibrary
RaiseException
OpenProcess
LocalAlloc
HeapSize
GetModuleFileNameW
DelayLoadFailureHook
GetCurrentThread
InitializeCriticalSectionAndSpinCount
ResumeThread
LoadLibraryExW
WaitForMultipleObjects
ReleaseMutex
ResetEvent
LoadLibraryW
VirtualFree
FlushInstructionCache
CloseHandle
GetVersionExW
ExpandEnvironmentStringsW
ProcessIdToSessionId
GetCurrentThreadId
FileTimeToSystemTime
lstrlenA
lstrlenW
GetSystemInfo
OutputDebugStringA
MultiByteToWideChar
HeapFree
ExitProcess
InitializeCriticalSection
GetSystemTimeAsFileTime
CompareStringW
LoadResource
PostQueuedCompletionStatus
HeapDestroy
CreateIoCompletionPort
SetEvent
QueryPerformanceCounter
GetBinaryTypeW
MulDiv
GetUserDefaultUILanguage
WideCharToMultiByte
OpenEventW
HeapCreate
GetLastError
GetSystemWindowsDirectoryW
GetProcessHeap
GetProcAddress
CreateEventW
LoadLibraryA
SetCurrentDirectoryW
SetUnhandledExceptionFilter
LeaveCriticalSection
HeapReAlloc
GetExitCodeThread
LockResource
SetLastError
Sleep
SystemTimeToFileTime
VirtualAlloc
TerminateThread
SizeofResource
lstrcmpiW
FindResourceW
UnhandledExceptionFilter
TerminateProcess
FindResourceExW
WaitForSingleObject
GetUserDefaultLCID
GetVersionExA
FindResourceA
user32
GetKeyState
UnregisterClassA
CharLowerBuffW
AdjustWindowRectEx
GetSystemMetrics
CreateWindowExW
CheckDlgButton
LoadAcceleratorsW
ShowWindow
TrackPopupMenuEx
GetClassNameW
SendMessageW
InvalidateRect
CallWindowProcW
GetMenu
SetWindowPos
GetParent
GetWindowThreadProcessId
GetProcessDefaultLayout
DestroyWindow
KillTimer
SetWindowTextW
LockWindowUpdate
DispatchMessageW
GetMessageW
IsWindowVisible
EnableMenuItem
MonitorFromPoint
SetFocus
PostMessageW
TranslateAcceleratorW
TranslateMessage
IsDlgButtonChecked
GetWindowPlacement
SetWindowLongW
SetCursor
GetMonitorInfoW
EnableWindow
GetClassInfoExW
IsWindow
GetDlgItem
LoadMenuW
BringWindowToTop
GetSysColorBrush
ReleaseDC
GetFocus
CharNextW
SetActiveWindow
GetDC
SendMessageA
CheckMenuRadioItem
DefWindowProcW
DeleteMenu
EnumChildWindows
IsWindowEnabled
SystemParametersInfoW
GetClientRect
IsZoomed
GetSysColor
TrackMouseEvent
RegisterClassExW
GetWindowRect
MoveWindow
GetSubMenu
DestroyMenu
GetWindowLongW
GetShellWindow
PostQuitMessage
MonitorFromRect
DestroyIcon
SetTimer
IsIconic
ClientToScreen
LoadStringW
LoadCursorW
gdi32
CreateFontIndirectW
SetBkMode
GetTextMetricsW
CreateDIBSection
SelectObject
CreateCompatibleDC
DeleteObject
DeleteDC
GetTextExtentPoint32W
GetObjectW
SetTextColor
GetDeviceCaps
GetStockObject
advapi32
GetTokenInformation
GetTraceEnableLevel
EqualSid
RegisterTraceGuidsW
SetEntriesInAclW
GetLengthSid
TraceEvent
CopySid
SetSecurityDescriptorDacl
GetTraceEnableFlags
RegCreateKeyExW
RegDeleteValueW
GetTraceLoggerHandle
RegCreateKeyW
RegSetValueExW
RegOpenKeyExW
AllocateAndInitializeSid
FreeSid
IsValidSid
InitializeSid
UnregisterTraceGuids
RegCloseKey
GetSidLengthRequired
RegEnumKeyExW
RegOpenKeyW
RegQueryInfoKeyW
OpenThreadToken
GetSidSubAuthority
OpenProcessToken
InitializeSecurityDescriptor
shell32
ShellExecuteW
ole32
CoTaskMemRealloc
CoRevokeClassObject
CoInitializeSecurity
OleInitialize
OleGetClipboard
CoResumeClassObjects
CoInitialize
CoGetClassObject
PropVariantClear
CoTaskMemFree
CoCreateInstance
CoTaskMemAlloc
CreateStreamOnHGlobal
CoRegisterClassObject
CoRevertToSelf
OleUninitialize
CoImpersonateClient
CoUninitialize
StringFromCLSID
oleaut32
VarUI4FromStr
SafeArrayGetUBound
SysStringByteLen
VariantCopy
SysAllocStringByteLen
DispCallFunc
SafeArrayGetLBound
VarBstrCat
GetErrorInfo
SafeArrayCreate
SysAllocString
SafeArrayDestroy
VariantInit
LoadRegTypeLi
VarBstrCmp
SafeArrayUnlock
VariantClear
SafeArrayRedim
SysAllocStringLen
SafeArrayLock
SysFreeString
LoadTypeLi
SysStringLen
VariantCopyInd
comctl32
ImageList_Add
shlwapi
UrlEscapeW
SHStrDupW
ColorHLSToRGB
UrlUnescapeW
winmm
midiInGetErrorTextA
midiInClose
midiInAddBuffer
midiDisconnect
midiOutClose
rpcrt4
UuidFromStringA
UuidIsNil
UuidCreate
UuidCreateNil
RpcStringFreeA
UuidToStringA
wldap32
ord47
gdiplus
GdiplusStartup
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.zztop Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 73KB - Virtual size: 580KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 730KB - Virtual size: 730KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.xyu Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ