Static task
static1
Behavioral task
behavioral1
Sample
a4770964b5c5b24bbe1c8740c56ae563ac944086c5459c52c4dc51702b27b300.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a4770964b5c5b24bbe1c8740c56ae563ac944086c5459c52c4dc51702b27b300.dll
Resource
win10v2004-20220901-en
General
-
Target
a4770964b5c5b24bbe1c8740c56ae563ac944086c5459c52c4dc51702b27b300
-
Size
15KB
-
MD5
834e2b67358fc18db7c4b56412f3b2b0
-
SHA1
b1d1fe79aa30af193659b354707aae6eccd25c7c
-
SHA256
a4770964b5c5b24bbe1c8740c56ae563ac944086c5459c52c4dc51702b27b300
-
SHA512
1adefc05789239cfdf4dca229e0d630d981d433c2e93482b7815aebfa46d785f0a680456f07859cbc7c330b39d513a9954354e7c6537c2e1e038a8355dadc36b
-
SSDEEP
192:dk6vGLf1YVZ1yvNoskY0iBDS0mKA0ZW9bU0YmCo/1i+RaYiovB9xWw:5vG25yvNvBW0jRZ4bwc/1k5Orx5
Malware Config
Signatures
Files
-
a4770964b5c5b24bbe1c8740c56ae563ac944086c5459c52c4dc51702b27b300.dll windows x86
eee2b0d83c50bc084eee3fa9cf2f576c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OpenProcess
GetCurrentProcessId
LeaveCriticalSection
EnterCriticalSection
lstrcpynA
GetFileSize
CloseHandle
ReadFile
SetFilePointer
CreateFileA
VirtualProtect
TerminateProcess
HeapAlloc
LoadLibraryA
GetModuleHandleA
GetProcAddress
GetCurrentProcess
InitializeCriticalSection
Sleep
GetPrivateProfileStringA
GetModuleFileNameA
GetProcessHeap
CreateThread
msvcrt
strlen
_strcmpi
strcmp
strncpy
_stricmp
malloc
??3@YAXPAX@Z
??2@YAPAXI@Z
__CxxFrameHandler
memcpy
_itoa
strrchr
__dllonexit
_onexit
_initterm
_adjust_fdiv
free
strcpy
memset
strstr
sprintf
_except_handler3
strcat
user32
wvsprintfA
Sections
.text Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ