Static task
static1
Behavioral task
behavioral1
Sample
9252deedcc9c2c3b227555703ad2798c61207bd12597471e028a6183bbaea11b.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
9252deedcc9c2c3b227555703ad2798c61207bd12597471e028a6183bbaea11b.dll
Resource
win10v2004-20220812-en
General
-
Target
9252deedcc9c2c3b227555703ad2798c61207bd12597471e028a6183bbaea11b
-
Size
40KB
-
MD5
9257646df0f7de2dc474e30890423e4d
-
SHA1
7083a369ca1769e177091feabe6f3718cabf920f
-
SHA256
9252deedcc9c2c3b227555703ad2798c61207bd12597471e028a6183bbaea11b
-
SHA512
710d303f257a32f1d8d8211a04ffa68c8be3911d52d4593ee3a7877d1ed9c6f74499d7d82ed7418e7aa6af374f8bf456270a86a915c03d9e3b300927e3dcc9d0
-
SSDEEP
768:p++p/Sqsv4vvgQGCLI1bq1/JOR6sdrBrZ:wgvYQJMo/JhsDZ
Malware Config
Signatures
Files
-
9252deedcc9c2c3b227555703ad2798c61207bd12597471e028a6183bbaea11b.dll windows x86
9884ba315d910337ed6434f00c2326e8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
wcsncmp
free
_endthreadex
calloc
realloc
??2@YAPAXI@Z
_purecall
memmove
_errno
??3@YAXPAX@Z
_initterm
wcschr
_ltow
??_U@YAPAXI@Z
_wcsrev
wcsstr
??_V@YAXPAX@Z
_beginthreadex
memset
swprintf
memcpy
shlwapi
SHEnumKeyExW
SHSetValueW
SHGetValueW
PathRemoveFileSpecW
PathFindFileNameW
ws2_32
WSAStartup
atl
ord40
wininet
FindNextUrlCacheEntryW
DeleteUrlCacheEntryW
UnlockUrlCacheEntryFileW
FindFirstUrlCacheEntryW
FindCloseUrlCache
ntdll
RtlRandom
kernel32
GetTickCount
WaitForSingleObject
QueueUserAPC
SetEvent
SleepEx
LeaveCriticalSection
EnterCriticalSection
SetPriorityClass
SetProcessAffinityMask
SetUnhandledExceptionFilter
MultiByteToWideChar
WriteFile
ReadFile
GetFileSize
InitializeCriticalSectionAndSpinCount
CreateEventW
GetCommandLineW
LocalFree
SetFilePointer
GetLastError
GetProcessAffinityMask
Sleep
FlushInstructionCache
LoadLibraryW
UnmapViewOfFile
VirtualAlloc
GetProcAddress
MapViewOfFile
CreateFileMappingW
CreateFileW
RaiseException
GetCurrentThreadId
OpenThread
TerminateThread
CloseHandle
GetCurrentProcessId
ExpandEnvironmentStringsW
GetModuleFileNameW
user32
ChildWindowFromPointEx
GetAncestor
SendMessageW
RegisterClassW
UnregisterClassW
CreateWindowExW
PostMessageW
GetMessageW
TranslateMessage
DispatchMessageW
SetWindowLongW
DestroyWindow
PostQuitMessage
GetParent
GetWindowLongW
FindWindowW
SetTimer
KillTimer
ShowWindow
SendMessageTimeoutW
CharLowerBuffW
GetClientRect
CharUpperBuffW
GetClassNameW
DefWindowProcW
ClientToScreen
ScreenToClient
advapi32
SetSecurityInfo
GetSecurityDescriptorSacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
shell32
ShellExecuteExW
ole32
OleUninitialize
OleInitialize
StringFromCLSID
ProgIDFromCLSID
CoTaskMemFree
oleaut32
SafeArrayCreate
SafeArrayCopy
SafeArrayGetVartype
SafeArrayGetUBound
SafeArrayGetLBound
VarBstrCmp
VariantClear
SysAllocStringLen
SysStringLen
SysStringByteLen
SysAllocStringByteLen
SysFreeString
SysAllocString
SafeArrayUnlock
SafeArrayLock
DispGetIDsOfNames
DispInvoke
CreateDispTypeInfo
VarBstrCat
SafeArrayDestroy
Sections
.text Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ