Static task
static1
Behavioral task
behavioral1
Sample
0e817c2259562901b5ae4c69063ee6bb3ef1a73b8d357228300cc478b27b4c24.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0e817c2259562901b5ae4c69063ee6bb3ef1a73b8d357228300cc478b27b4c24.dll
Resource
win10v2004-20220812-en
General
-
Target
0e817c2259562901b5ae4c69063ee6bb3ef1a73b8d357228300cc478b27b4c24
-
Size
101KB
-
MD5
81b823ec53592dcca44e1bafbe4f6217
-
SHA1
0935a814437a70b308958513562d4cba31c0e8f1
-
SHA256
0e817c2259562901b5ae4c69063ee6bb3ef1a73b8d357228300cc478b27b4c24
-
SHA512
7cc55f6932e81841ecf9e25440f02012393216a077ff66f54037053d7800ec572e4df4c1d681f199a062a7f5653cdf737911682d76ec09e7031d9621f2062386
-
SSDEEP
3072:Ppp3FIIC9+iBkyGCaJ5T0nraIFEFQtiADN4:PDnzeVuQtxG
Malware Config
Signatures
Files
-
0e817c2259562901b5ae4c69063ee6bb3ef1a73b8d357228300cc478b27b4c24.dll windows x86
7faaedde8da18e17ab5ae1e1a460ee28
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersionExA
LoadLibraryA
InterlockedIncrement
InterlockedDecrement
InterlockedExchangeAdd
Sleep
GetSystemTimeAsFileTime
GetLocalTime
VirtualAlloc
VirtualProtect
GetTickCount
IsDebuggerPresent
GetComputerNameA
GetCurrentThreadId
GetCurrentProcess
IsBadWritePtr
IsBadStringPtrA
IsBadReadPtr
GetProcAddress
GetProcessHeap
user32
GetWindow
GetForegroundWindow
IsClipboardFormatAvailable
GetCursor
GetWindowContextHelpId
GetWindowRect
GetClientRect
IsZoomed
GetGUIThreadInfo
IsChild
IsMenu
BlockInput
InSendMessage
GetWindowRgn
IsCharAlphaA
IsCharUpperA
GetWindowDC
advapi32
IsValidSid
IsValidSecurityDescriptor
msvcrt
ldiv
_ultoa
_CIsinh
_CIpow
_adjust_fdiv
malloc
_initterm
free
memmove
time
_hypot
floor
frexp
_pctype
_isctype
ldexp
__mb_cur_max
modf
_CIcosh
_memicmp
gdi32
GetStretchBltMode
GdiGetBatchLimit
GetBkMode
GetBitmapDimensionEx
GdiFlush
ole32
CoDosDateTimeToFileTime
CoFileTimeNow
shell32
ord680
ord66
ord524
Sections
.text Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 65KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ