Ohggjn
Static task
static1
Behavioral task
behavioral1
Sample
db370266e69e39448164ba7192a65e77926e2b7346de087301898db95201c9b7.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
db370266e69e39448164ba7192a65e77926e2b7346de087301898db95201c9b7.dll
Resource
win10v2004-20220812-en
General
-
Target
db370266e69e39448164ba7192a65e77926e2b7346de087301898db95201c9b7
-
Size
188KB
-
MD5
0c80a661d57fd4360087f04fee0f5090
-
SHA1
370015662387fc794e00422d50e980d61f9751ca
-
SHA256
db370266e69e39448164ba7192a65e77926e2b7346de087301898db95201c9b7
-
SHA512
d392c4fd808f2c3b09a3184306a60d586cdfb15b33056e378e513d1d98b346363cb3ea317f94c031ef6c1d765f15071bb07028cffc9c1e1396ccaf740a816ff9
-
SSDEEP
3072:2d/yYJDOq65NE7luH9hShY9n2JWdk627nrHyJSXDcl1g6:6/yY965NExkShYN2JWd5ZSG1g
Malware Config
Signatures
Files
-
db370266e69e39448164ba7192a65e77926e2b7346de087301898db95201c9b7.dll windows x86
264283edf61531b76240c3ba844e9975
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
SetTextJustification
EnumFontsA
GetBoundsRect
kernel32
CloseHandle
CreateEventA
CreateThread
DebugBreak
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetLocalTime
GetModuleFileNameA
GetProcessHeap
GlobalFindAtomA
Heap32First
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
OutputDebugStringA
ReleaseMutex
ResetEvent
SetEndOfFile
SetEvent
SetFilePointer
SetThreadPriority
SetUnhandledExceptionFilter
Sleep
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
VirtualAlloc
VirtualFree
WaitForMultipleObjects
WaitForSingleObject
WriteFile
lstrcmpiA
lstrcpynA
lstrlenA
GetStringTypeW
GetSystemTimeAsFileTime
GetTickCount
InterlockedCompareExchange
LoadLibraryW
MoveFileW
QueryPerformanceCounter
SearchPathA
SetVolumeMountPointA
RtlUnwind
UnhandledExceptionFilter
GetCommandLineA
GetVersionExA
HeapFree
HeapAlloc
ExitProcess
SetLastError
GetLastError
GetCurrentThread
GetProcAddress
GetModuleHandleA
TerminateProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
ReadFile
LeaveCriticalSection
FatalAppExitA
EnterCriticalSection
HeapReAlloc
IsBadWritePtr
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetTimeFormatA
GetDateFormatA
GetCPInfo
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
GetStringTypeA
GetACP
GetOEMCP
InitializeCriticalSection
VirtualQuery
LoadLibraryA
SetStdHandle
VirtualProtect
GetSystemInfo
GetTimeZoneInformation
RaiseException
SetConsoleCtrlHandler
HeapSize
FlushFileBuffers
GetLocaleInfoW
CompareStringA
CompareStringW
SetEnvironmentVariableA
ole32
OleSetContainedObject
OleCreateDefaultHandler
rpcrt4
NdrProxyGetBuffer
MesDecodeBufferHandleCreate
NdrSimpleStructMarshall
I_RpcTransConnectionReallocPacket
MesEncodeIncrementalHandleCreate
NdrRpcSsDefaultAllocate
Exports
Exports
Sections
.text Size: 92KB - Virtual size: 91KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 72KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ