1648431985
Static task
static1
Behavioral task
behavioral1
Sample
8c8e06674476b5355b24339d2bbf5d68346d452b47e9d0674d3ac0d266814b35.dll
Resource
win7-20220812-en
General
-
Target
8c8e06674476b5355b24339d2bbf5d68346d452b47e9d0674d3ac0d266814b35
-
Size
255KB
-
MD5
919267f1a21f7f8664c5115d18e279c0
-
SHA1
e0161a824be4e0401c3b637c968a2c8c3f18586b
-
SHA256
8c8e06674476b5355b24339d2bbf5d68346d452b47e9d0674d3ac0d266814b35
-
SHA512
9452b4d66cdf25b8c60b5f910fc5ea1d2825eacff548bcc84cd9d3f011956039419f08ab82930f66baeb77dd337f5d65b0112a3b69e57706df39a55d9bf7891a
-
SSDEEP
3072:rk9oFyI+XfBVTY5TJClo9zQsZas7/29dH5iiXwo77BqlU83kxVwmutXM32:IsGXfBVTYBJCy2CX7/O0YdAeeIuTXF
Malware Config
Signatures
Files
-
8c8e06674476b5355b24339d2bbf5d68346d452b47e9d0674d3ac0d266814b35.dll windows x86
d933672ab352d7336021beb5d1e112b4
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteFile
SetFilePointer
FlushFileBuffers
CreateFileA
GlobalAddAtomA
lstrcmpW
GlobalDeleteAtom
GlobalFindAtomA
GetLocaleInfoA
GetCPInfo
GetOEMCP
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
HeapAlloc
HeapFree
HeapReAlloc
RtlUnwind
RaiseException
VirtualAlloc
HeapSize
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
HeapDestroy
VirtualFree
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
GetStringTypeA
GetStringTypeW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
LoadLibraryA
GlobalFlags
GetCurrentThreadId
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
InterlockedDecrement
InterlockedIncrement
GetModuleHandleW
CompareStringA
lstrcmpA
GlobalGetAtomNameA
GetModuleFileNameA
GetLastError
SetLastError
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
FindResourceA
LoadResource
LockResource
SizeofResource
lstrlenA
WideCharToMultiByte
MultiByteToWideChar
WaitForSingleObject
CreateThread
Sleep
GetCurrentThread
SuspendThread
GetCurrentProcess
GetProcAddress
GetVersionExA
FreeLibrary
GetModuleHandleA
GetCurrentProcessId
GetWindowsDirectoryA
Module32First
ExitProcess
ReadProcessMemory
OpenProcess
CloseHandle
Process32Next
Process32First
CreateToolhelp32Snapshot
user32
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
RegisterWindowMessageA
LoadIconA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
SetForegroundWindow
GetClientRect
PostMessageA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
DefWindowProcA
CallWindowProcA
GetMenu
SystemParametersInfoA
IsIconic
GetWindowPlacement
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
ModifyMenuA
EnableMenuItem
CheckMenuItem
SetWindowPos
IsWindow
GetDlgItem
GetFocus
ClientToScreen
GetWindow
AnimateWindow
WindowFromPoint
GetWindowTextA
GetWindowLongA
GetDlgCtrlID
GetWindowRect
PtInRect
SetWindowTextA
SetWindowsHookExA
CallNextHookEx
DispatchMessageA
GetKeyState
PeekMessageA
EnumChildWindows
GetDC
SetWindowLongA
LockWindowUpdate
GetClassNameA
DestroyMenu
PostQuitMessage
GetSubMenu
GetMenuItemCount
GetMenuItemID
ValidateRect
UnhookWindowsHookEx
LoadCursorA
GetSystemMetrics
ReleaseDC
GetSysColor
GetSysColorBrush
GetWindowThreadProcessId
SendMessageA
GetParent
GetLastActivePopup
IsWindowEnabled
EnableWindow
MessageBoxA
GetMenuState
LoadBitmapA
gdi32
GetStockObject
CreateBitmap
GetClipBox
SetTextColor
SetBkColor
SaveDC
RestoreDC
Rectangle
TextOutA
DeleteDC
ScaleViewportExtEx
SetMapMode
ScaleWindowExtEx
SetWindowExtEx
DeleteObject
GetDeviceCaps
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
RectVisible
PtVisible
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
oleacc
LresultFromObject
CreateStdAccessibleObject
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
oleaut32
VariantClear
VariantChangeType
VariantInit
Exports
Exports
Sections
.text Size: 116KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE