Static task
static1
Behavioral task
behavioral1
Sample
694263e33e92ea1980595ce3972f1c0427196718ddda3fa294d78e1e8859ba18.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
694263e33e92ea1980595ce3972f1c0427196718ddda3fa294d78e1e8859ba18.dll
Resource
win10v2004-20220812-en
General
-
Target
694263e33e92ea1980595ce3972f1c0427196718ddda3fa294d78e1e8859ba18
-
Size
192KB
-
MD5
931d7f8b55d9c396a1c22924b5821206
-
SHA1
0d4120f2c3a432cb18be402cd083cb739c7966d4
-
SHA256
694263e33e92ea1980595ce3972f1c0427196718ddda3fa294d78e1e8859ba18
-
SHA512
b47da060fe1fc7feeaf605fcd258c6ac8d8ad77826718aff555665f2d4445fcb5cb30e9126cc1ac640e349a25469a82df94cefac14fbdcae82a4e503914d0ff2
-
SSDEEP
3072:eQ6Uu8bnNO6BhPQ67u+1DSfhn5eMzo0RRpAxzoyFRID3KkmwZ+t+CyKsk3p:w78rkg5Q+u+1y9z/OFoyFCDmwZm
Malware Config
Signatures
Files
-
694263e33e92ea1980595ce3972f1c0427196718ddda3fa294d78e1e8859ba18.dll windows x86
084a11d3aa1e64814c5150bcb6b4fe23
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
RegDeleteKeyW
RegCreateKeyExW
RegDeleteValueW
RegEnumKeyExW
RegSetValueExW
kernel32
GetProcessHeap
GetProcAddress
FatalAppExitA
SetThreadIdealProcessor
FormatMessageA
GetFileAttributesW
LoadLibraryA
GetModuleFileNameA
GetModuleHandleA
FindFirstFileW
FindNextFileW
FindClose
GetLocaleInfoW
GetModuleFileNameW
InterlockedDecrement
InterlockedIncrement
GetVolumeInformationW
GetTickCount
GetTimeZoneInformation
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
GetStringTypeW
CompareStringA
CompareStringW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
GetLastError
PeekNamedPipe
QueryPerformanceCounter
GetEnvironmentStrings
FreeEnvironmentStringsA
HeapCreate
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
CloseHandle
DeleteFileW
RemoveDirectoryW
FreeLibrary
GetCurrentProcessId
FreeEnvironmentStringsW
GetCommandLineW
GetEnvironmentVariableW
GetConsoleWindow
GetExitCodeProcess
TerminateProcess
VerifyVersionInfoW
VerSetConditionMask
DuplicateHandle
GetHandleInformation
SetHandleInformation
CreateFileW
CopyFileW
CreateHardLinkW
MoveFileExW
GetTempPathW
GetFileSizeEx
SetFilePointerEx
LockFileEx
UnlockFile
GetFullPathNameW
CreateDirectoryW
GetCurrentDirectoryW
SetCurrentDirectoryW
CreatePipe
ReadFile
CreateNamedPipeW
ConnectNamedPipe
WaitNamedPipeW
SetEndOfFile
GetNamedPipeInfo
SetNamedPipeHandleState
DisconnectNamedPipe
CreateMailslotW
WriteFile
GetOverlappedResult
FlushFileBuffers
GetDiskFreeSpaceExW
DeviceIoControl
WaitForSingleObject
WaitForMultipleObjects
CreateEventW
OpenEventW
SetEvent
PulseEvent
ResetEvent
CreateMutexW
OpenMutexW
ReleaseMutex
LoadLibraryExW
GetModuleHandleExW
SetDllDirectoryW
SetEnvironmentVariableW
GetEnvironmentStringsW
GetStdHandle
SetStdHandle
CreateProcessW
SetThreadPriority
GetThreadPriority
TlsAlloc
TlsGetValue
TlsSetValue
VirtualAlloc
VirtualFree
GlobalMemoryStatusEx
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
GetComputerNameW
GetCurrentProcess
LCMapStringW
LocalAlloc
LocalFree
LocalReAlloc
FormatMessageW
GetSystemTimeAsFileTime
Sleep
InterlockedExchange
RtlUnwind
RaiseException
ExitProcess
MultiByteToWideChar
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
GetCurrentThreadId
GetCommandLineA
GetVersionExA
HeapAlloc
GetProcessHeap
HeapReAlloc
WideCharToMultiByte
LCMapStringA
GetCPInfo
TlsFree
SetLastError
GetCurrentThread
GetACP
GetOEMCP
IsValidCodePage
HeapSize
SetConsoleCtrlHandler
SetEnvironmentVariableA
GetConsoleCP
GetConsoleMode
SetHandleCount
GetFileType
GetStartupInfoA
SetFilePointer
HeapDestroy
gdi32
DeleteObject
SelectObject
StretchBlt
GetDIBColorTable
SetDIBColorTable
GetObjectW
GetStockObject
RemoveFontMemResourceEx
CreateDIBSection
DeleteDC
Rectangle
CreateSolidBrush
SetWindowOrgEx
SetViewportOrgEx
LPtoDP
GetDeviceCaps
CreateDCW
CreateRectRgnIndirect
SetMapMode
SaveDC
RestoreDC
GdiFlush
BitBlt
GetGlyphOutlineW
CreateFontW
AddFontMemResourceEx
CreateCompatibleDC
user32
ToUnicode
GetMessageExtraInfo
ScreenToClient
TrackMouseEvent
CreateWindowExW
ShowWindow
UpdateWindow
CharNextW
UnionRect
IntersectRect
OffsetRect
RegisterClassExW
IsDialogMessageW
GetClassInfoExW
GetKeyState
IsChild
SetWindowRgn
GetWindowDC
UnregisterClassA
CallWindowProcW
GetPropW
EndDialog
DialogBoxIndirectParamW
DefWindowProcW
SystemParametersInfoW
HideCaret
GetDlgItem
GetDlgCtrlID
GetParent
IsDlgButtonChecked
WindowFromPoint
IsWindow
MsgWaitForMultipleObjects
GetMonitorInfoW
MonitorFromWindow
CheckDlgButton
EnableWindow
EndPaint
TrackPopupMenu
MapWindowPoints
GetClientRect
GetWindowRect
GetActiveWindow
EqualRect
PtInRect
MessageBoxW
GetSysColor
SetRect
ClientToScreen
DialogBoxParamW
NotifyWinEvent
UnregisterClassW
GetCaretBlinkTime
GetDoubleClickTime
GetSystemMetrics
GetFocus
IsClipboardFormatAvailable
OpenClipboard
GetClipboardData
CloseClipboard
EmptyClipboard
MsgWaitForMultipleObjectsEx
ReleaseCapture
SetCapture
DestroyWindow
GetDesktopWindow
SetFocus
SetCursor
WindowFromDC
InvalidateRect
DestroyMenu
RegisterClassW
LoadCursorW
SetRectEmpty
TranslateMessage
PeekMessageW
DispatchMessageW
CharLowerBuffW
GetCursorPos
SetPropW
GetSubMenu
RemoveMenu
SetMenuItemInfoW
LoadMenuIndirectW
KillTimer
SetWindowTextW
SetTimer
BeginPaint
SetClipboardData
GetKeyboardLayout
PostMessageW
FindWindowW
RegisterWindowMessageW
PostThreadMessageW
GetWindowLongW
SetWindowLongW
GetForegroundWindow
EnumDisplayDevicesW
SendMessageW
SetWindowPos
GetDC
ReleaseDC
GetKeyboardState
RemovePropW
GetWindowTextW
GetWindow
shell32
ShellExecuteExW
ShellExecuteW
SHFileOperationW
SHGetFolderPathW
comdlg32
GetSaveFileNameW
GetOpenFileNameW
CommDlgExtendedError
comctl32
InitCommonControlsEx
ole32
CoCreateInstance
OleRegGetMiscStatus
OleSaveToStream
OleLoadFromStream
OleRegEnumVerbs
OleRegGetUserType
WriteClassStm
CoTaskMemRealloc
CreateOleAdviseHolder
StringFromGUID2
CoInitializeEx
CoUninitialize
CoTaskMemFree
CoTaskMemAlloc
CreateBindCtx
CreateStreamOnHGlobal
CoInitialize
CoGetMalloc
shlwapi
PathCombineW
StrCmpIW
PathAppendW
PathIsRelativeW
PathFindExtensionW
UrlUnescapeW
UrlCreateFromPathW
PathCreateFromUrlW
PathRemoveFileSpecW
oleacc
LresultFromObject
pdh
PdhGetFormattedCounterValue
PdhCollectQueryData
PdhAddCounterW
PdhMakeCounterPathW
PdhLookupPerfNameByIndexW
PdhCloseQuery
PdhOpenQueryW
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
winmm
timeGetDevCaps
timeEndPeriod
timeBeginPeriod
timeGetTime
crypt32
CertVerifyCertificateChainPolicy
setupapi
SetupIterateCabinetW
oleaut32
DispGetIDsOfNames
DispGetIDsOfNames
VarUI4FromDec
SetErrorInfo
Sections
.text Size: 147KB - Virtual size: 146KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 294B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ