Static task
static1
Behavioral task
behavioral1
Sample
c10004026bee68054fd755861a1e1b37c2c9a2a6dd3ae7425eb72a3d7fa26359.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c10004026bee68054fd755861a1e1b37c2c9a2a6dd3ae7425eb72a3d7fa26359.dll
Resource
win10v2004-20220812-en
General
-
Target
c10004026bee68054fd755861a1e1b37c2c9a2a6dd3ae7425eb72a3d7fa26359
-
Size
40KB
-
MD5
849979681c051043dbeb616eba382ef7
-
SHA1
609b8e68eb1dd6693eeeaac6e27c24e024079fe3
-
SHA256
c10004026bee68054fd755861a1e1b37c2c9a2a6dd3ae7425eb72a3d7fa26359
-
SHA512
16ca54dace1e9142dba124c608b3d105672029512f501e3c8676690d1e0c7f267279bdba01786ae47fdc9d07961b8f0caf06fe123b7fa115708576809e2467c9
-
SSDEEP
768:4oFToL6+UGn9YI5Dng4LoJf01/DgzCjXM:hK9FpMG/LDM
Malware Config
Signatures
Files
-
c10004026bee68054fd755861a1e1b37c2c9a2a6dd3ae7425eb72a3d7fa26359.dll windows x86
4ec51e9a125bfadd5d217a6823f99f0a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
wcsncmp
_endthreadex
calloc
realloc
_wcsrev
_purecall
memmove
_errno
_initterm
??3@YAXPAX@Z
_ltow
??2@YAPAXI@Z
wcschr
??_U@YAPAXI@Z
wcsstr
??_V@YAXPAX@Z
free
_beginthreadex
memset
memcpy
shlwapi
SHEnumKeyExW
SHGetValueW
SHSetValueW
PathRemoveFileSpecW
PathFindFileNameW
ws2_32
WSAStartup
atl
ord40
wininet
FindNextUrlCacheEntryW
DeleteUrlCacheEntryW
UnlockUrlCacheEntryFileW
FindFirstUrlCacheEntryW
FindCloseUrlCache
ntdll
RtlRandom
kernel32
GetTickCount
WaitForSingleObject
QueueUserAPC
SetEvent
SleepEx
LeaveCriticalSection
EnterCriticalSection
SetUnhandledExceptionFilter
Sleep
MultiByteToWideChar
WriteFile
ReadFile
GetFileSize
InitializeCriticalSectionAndSpinCount
CreateEventW
GetCommandLineW
LocalFree
SetFilePointer
GetLastError
SetPriorityClass
SetProcessAffinityMask
FlushInstructionCache
LoadLibraryW
UnmapViewOfFile
VirtualAlloc
GetProcAddress
MapViewOfFile
CreateFileMappingW
CreateFileW
RaiseException
GetCurrentThreadId
OpenThread
TerminateThread
CloseHandle
GetCurrentProcessId
ExpandEnvironmentStringsW
GetModuleFileNameW
user32
ClientToScreen
GetAncestor
RegisterClassW
UnregisterClassW
CreateWindowExW
PostMessageW
GetMessageW
TranslateMessage
DispatchMessageW
SetWindowLongW
DestroyWindow
PostQuitMessage
SendMessageW
GetWindowLongW
FindWindowW
SetTimer
KillTimer
ShowWindow
SendMessageTimeoutW
CharLowerBuffW
GetClientRect
GetClassNameW
ChildWindowFromPointEx
DefWindowProcW
ScreenToClient
GetParent
advapi32
SetSecurityInfo
GetSecurityDescriptorSacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
shell32
ShellExecuteExW
ole32
OleInitialize
OleUninitialize
oleaut32
SafeArrayLock
SafeArrayUnlock
SafeArrayDestroy
SafeArrayCreate
SafeArrayCopy
SafeArrayGetVartype
SafeArrayGetUBound
SafeArrayGetLBound
VarBstrCmp
VariantClear
SysAllocStringLen
SysStringLen
SysStringByteLen
SysAllocStringByteLen
SysFreeString
SysAllocString
DispInvoke
CreateDispTypeInfo
VarBstrCat
DispGetIDsOfNames
Sections
.text Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ