DllGetClassObject
DllRegisterServer
PluginInit
RunObject
Behavioral task
behavioral1
Sample
tmp4g3co4ey.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
tmp4g3co4ey.dll
Resource
win10v2004-20220812-en
Target
tmp4g3co4ey
Size
13KB
MD5
600f3aa1defcdde9a1e67c67e7f0a960
SHA1
09cd682c09c7ef92e54199e2b9b24684c6e61953
SHA256
aa6838ea720635486d691383b750b9cd878575bffc3dd5e18fdd0c93b4287038
SHA512
c1a484a7b49b1e3cf687f0b6ef7ecb1efdc60982819978e5bf493a54bf229d1102109b3780229c3730b1481a41f8ae333b8334207d2030d3fc7501bb506566ce
SSDEEP
192:sHVMfa7TTCjJSixzPSAA56RCK7Yu/VPgw3QOXBAQYfPq/3Kb:s1Mf0gJSix2AA56RCiZVCcGQYnq/6b
icedid
3447045697
nipsontaz.com
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
WinHttpCloseHandle
WinHttpOpen
WinHttpSendRequest
WinHttpConnect
WinHttpQueryHeaders
WinHttpReceiveResponse
WinHttpSetStatusCallback
WinHttpOpenRequest
WinHttpSetOption
WinHttpQueryDataAvailable
WinHttpReadData
wsprintfW
memset
SwitchToThread
CreateFileA
GetLastError
WideCharToMultiByte
lstrlenW
VirtualProtect
VirtualAlloc
lstrcatA
lstrcpyA
GetTempPathA
CreateDirectoryA
LoadLibraryA
GetProcAddress
GetComputerNameExW
Sleep
ExitProcess
CreateThread
HeapAlloc
HeapFree
GetProcessHeap
HeapReAlloc
WriteFile
CloseHandle
GetTickCount64
GetUserNameW
LookupAccountNameW
SHGetFolderPathA
DllGetClassObject
DllRegisterServer
PluginInit
RunObject
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE