Static task
static1
Behavioral task
behavioral1
Sample
0b276f7962f2ca392ffd4d650a3efae902e9f403b5f0c0362b284feb5c5b774c_unpacked_x64.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0b276f7962f2ca392ffd4d650a3efae902e9f403b5f0c0362b284feb5c5b774c_unpacked_x64.dll
Resource
win10v2004-20220901-en
General
-
Target
0b276f7962f2ca392ffd4d650a3efae902e9f403b5f0c0362b284feb5c5b774c_unpacked_x64
-
Size
123KB
-
MD5
1fd29cdbea0d0d884f24f00be34fa04d
-
SHA1
a0d4050ca3df34036f3ff0e29207144aa1e34b69
-
SHA256
1e3b87e7af4c5a717c260f3a35ce9503eea4bf191a8a5475dd98b2318a16265c
-
SHA512
7f2c63d02f4a8322b86f6e6db48f0ec823df435a6ae120ca401990e07c8e8c682f9a8e89db23623030b1adced1bbdf226c480cf63e8fb11f564a85cf663980ae
-
SSDEEP
3072:O3sn2XmstEypQ7t4igLEJyip/EUyxpx2S0W99rA5Q5Cp:SXmstEypVS1rStH5Cp
Malware Config
Signatures
Files
-
0b276f7962f2ca392ffd4d650a3efae902e9f403b5f0c0362b284feb5c5b774c_unpacked_x64.dll windows x64
99351b849054a9550e0eef003674c392
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
lstrlenA
lstrcatA
lstrcpyA
ExitProcess
GetModuleHandleA
lstrcpyW
GetLastError
SetLastError
GetModuleFileNameA
GetCurrentThreadId
GetCurrentProcessId
IsBadReadPtr
GetProcAddress
LoadLibraryA
TlsGetValue
TlsSetValue
GetModuleFileNameW
TlsAlloc
TlsFree
TerminateThread
Sleep
DeleteFileA
CreateThread
IsBadWritePtr
OpenProcess
TerminateProcess
OpenEventA
IsBadCodePtr
SetEvent
GetWindowsDirectoryA
CreateFileA
lstrcmpA
WaitForSingleObject
SignalObjectAndWait
GetTickCount
CreateEventA
ResetEvent
SetInformationJobObject
CreateJobObjectA
MoveFileExA
GetTempPathA
ResumeThread
WinExec
CloseHandle
lstrcmpiA
LocalAlloc
FreeLibrary
RaiseException
InitializeCriticalSection
WideCharToMultiByte
LeaveCriticalSection
MultiByteToWideChar
lstrlenW
EnterCriticalSection
DeleteCriticalSection
HeapReAlloc
HeapAlloc
HeapFree
HeapCreate
VirtualAlloc
SetFilePointer
lstrcatW
GetFileSize
WriteFile
ReadFile
CreateFileW
FindFirstFileA
RemoveDirectoryA
FindClose
FindNextFileA
SetUnhandledExceptionFilter
GetCurrentProcess
Process32First
GetModuleHandleW
ReadProcessMemory
VirtualProtectEx
Process32Next
lstrcmpiW
CreateToolhelp32Snapshot
WriteProcessMemory
SetErrorMode
GetVolumeInformationA
GetSystemInfo
GetVersionExA
MapViewOfFile
UnmapViewOfFile
CreateFileMappingA
VirtualProtect
GetLocalTime
GlobalSize
GlobalLock
GlobalAlloc
GlobalUnlock
GlobalFree
GetCurrentDirectoryA
VirtualFreeEx
VirtualAllocEx
SuspendThread
GetThreadContext
CreateRemoteThread
CallNamedPipeA
ConnectNamedPipe
CreateNamedPipeW
DisconnectNamedPipe
FlushFileBuffers
CreateNamedPipeA
iphlpapi
GetAdaptersInfo
Sections
.text Size: 90KB - Virtual size: 90KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
bss Size: - Virtual size: 6KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 782B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ