Static task
static1
Behavioral task
behavioral1
Sample
b71f5d8ce8cd0032c58405b7791b438a007c4332b298c092acd33a2c55423799.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b71f5d8ce8cd0032c58405b7791b438a007c4332b298c092acd33a2c55423799.dll
Resource
win10v2004-20220812-en
General
-
Target
b71f5d8ce8cd0032c58405b7791b438a007c4332b298c092acd33a2c55423799.zip
-
Size
533KB
-
MD5
ded01f419760a80eefb7ca37b5af708b
-
SHA1
8c2fe0017d4501e0c1d70c58f9b4263e7803a3eb
-
SHA256
60a58589ff42994af95271a2a2ac209028cf7f336b89f68bb8366093ad95865b
-
SHA512
d133527af85740e184f359940594a884cefb8c275e4b3a067fdb6607f06b32209b2e8b3ad3681f92c860236d38ee521edbbb080e1530149dbbe9c166041f1a03
-
SSDEEP
12288:0izybi+pPdZS54odG3LP1gkM57xeYDbEsKlC5rXg7Gv/A14CARR:0iyWSZ2Y+xMybglCRXrCARR
Malware Config
Signatures
Files
-
b71f5d8ce8cd0032c58405b7791b438a007c4332b298c092acd33a2c55423799.zip.zip
Password: infected
-
b71f5d8ce8cd0032c58405b7791b438a007c4332b298c092acd33a2c55423799.dll windows x86
Password: infected
b7ec208bcb2d389768128a74bb5d232a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
IsDBCSLeadByte
LoadLibraryA
InterlockedDecrement
InterlockedExchangeAdd
GetACP
GetProcAddress
GetVersion
VirtualAlloc
VirtualProtect
Sleep
QueryPerformanceFrequency
QueryPerformanceCounter
SetLastError
IsDebuggerPresent
GetLastError
GetCurrentProcess
IsBadCodePtr
IsBadWritePtr
GetModuleFileNameA
GetProcessHeap
user32
GetWindowThreadProcessId
GetLastActivePopup
GetAncestor
GetDlgItem
CopyIcon
GetIconInfo
GetMenuContextHelpId
GetClientRect
GetWindowTextA
IsCharUpperA
GetTopWindow
IsIconic
IsChild
BlockInput
InSendMessage
WindowFromDC
GetWindowDC
IsCharAlphaNumericA
IsCharAlphaA
GetWindowRgn
GetForegroundWindow
advapi32
RevertToSelf
IsValidAcl
InitializeSecurityDescriptor
IsValidSecurityDescriptor
AreAnyAccessesGranted
msvcrt
_CIpow
ldiv
_CIasin
_itoa
__doserrno
__mb_cur_max
_adjust_fdiv
malloc
_initterm
free
memmove
_ultoa
srand
rand
floor
ceil
_hypot
_pctype
_isctype
frexp
_CIacos
gdi32
GetStretchBltMode
GetROP2
GetBkMode
GdiFlush
ole32
CoRevertToSelf
shell32
ord66
ord680
DuplicateIcon
ord524
ord64
Sections
.text Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 61KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
b71f5d8ce8cd0032c58405b7791b438a007c4332b298c092acd33a2c55423799_dump_0x008D1000