CreateInterface
Static task
static1
Behavioral task
behavioral1
Sample
2feb8531b03da5046bd7bc955fe0f443d07c77289064ab148c16a35f89e921c6.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2feb8531b03da5046bd7bc955fe0f443d07c77289064ab148c16a35f89e921c6.dll
Resource
win10v2004-20220812-en
General
-
Target
2feb8531b03da5046bd7bc955fe0f443d07c77289064ab148c16a35f89e921c6
-
Size
540KB
-
MD5
8264db4ac043411ec0ff8198ce27be59
-
SHA1
6839110cc302763d16a45f1585fd49de8e8e6122
-
SHA256
2feb8531b03da5046bd7bc955fe0f443d07c77289064ab148c16a35f89e921c6
-
SHA512
2c1e89e2e9ba7cea6078238bcfe5598f4f94a343f1e7c116735c32cd5dae37c4cd9f5a7d6c2424507eeb8aa67560311b79591a5b592aa3b68b09438414753b8c
-
SSDEEP
12288:UxZkGA9m5AP4QmldXUGYv7Png4LWbG0GbYjRg2UVsAarPoK5U1Im3pHQCaOOfa:Uv5AP4QmlGgy+GbYjRxUS9LoKk9Iha
Malware Config
Signatures
Files
-
2feb8531b03da5046bd7bc955fe0f443d07c77289064ab148c16a35f89e921c6.dll windows x86
23801ab2f6210a5b90bbf89fedb16451
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcess
LeaveCriticalSection
OutputDebugStringA
EnterCriticalSection
InitializeCriticalSection
GetEnvironmentVariableA
GetModuleFileNameA
TerminateProcess
VirtualQuery
HeapAlloc
GetProcessHeap
FindNextFileA
FindClose
FindFirstFileA
SetConsoleTextAttribute
GetStdHandle
GetModuleHandleA
GetConsoleScreenBufferInfo
GetNumberOfConsoleInputEvents
PeekConsoleInputA
GetConsoleMode
SetConsoleMode
ReadConsoleInputA
GetLocaleInfoW
SetConsoleCtrlHandler
SetEndOfFile
IsBadCodePtr
IsBadWritePtr
IsBadReadPtr
SetUnhandledExceptionFilter
RaiseException
CreateFileA
SetStdHandle
MultiByteToWideChar
WideCharToMultiByte
GetProcAddress
LoadLibraryA
FreeLibrary
GetDriveTypeA
GetCurrentDirectoryA
GetFullPathNameA
GetLastError
CreateDirectoryA
FileTimeToSystemTime
FileTimeToLocalFileTime
GetFileAttributesA
SetEnvironmentVariableA
SetCurrentDirectoryA
GetCurrentThreadId
GetCommandLineA
GetVersionExA
RtlUnwind
ExitProcess
DeleteCriticalSection
FatalAppExitA
TlsAlloc
SetLastError
GetCurrentThread
TlsFree
TlsSetValue
TlsGetValue
SetHandleCount
GetFileType
GetStartupInfoA
SetEnvironmentVariableW
CloseHandle
ReadFile
SetFilePointer
VirtualProtect
VirtualAlloc
GetSystemInfo
GetACP
GetOEMCP
GetCPInfo
WriteFile
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
UnhandledExceptionFilter
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringA
LCMapStringW
InterlockedExchange
GetStringTypeA
GetStringTypeW
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
GetTimeZoneInformation
FlushFileBuffers
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
CompareStringA
CompareStringW
WriteConsoleA
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
tier0
?DevMsg@@YAXPBDZZ
DevMsg
_AssertValidReadPtr
_AssertValidWritePtr
AssertValidStringPtr
MemAllocScratch
MemFreeScratch
CommandLine_Tier0
Warning
Error
SpewOutputFunc
g_pMemAlloc
Msg
GetCPUInformation
vstdlib
KeyValuesSystem
Exports
Exports
Sections
.text Size: 276KB - Virtual size: 274KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 113KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text Size: 196KB - Virtual size: 196KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE