Static task
static1
Behavioral task
behavioral1
Sample
aa7ff7cfe4e452cb0c9ca62f36b717ca0c7dd8856f145f6732e03eea94f33df7.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
aa7ff7cfe4e452cb0c9ca62f36b717ca0c7dd8856f145f6732e03eea94f33df7.dll
Resource
win10v2004-20220812-en
General
-
Target
aa7ff7cfe4e452cb0c9ca62f36b717ca0c7dd8856f145f6732e03eea94f33df7
-
Size
132KB
-
MD5
82b1d60a46d6965f36c2637e206658c2
-
SHA1
836b4ecbc8169d031c948e4bd2960fe29854c5d6
-
SHA256
aa7ff7cfe4e452cb0c9ca62f36b717ca0c7dd8856f145f6732e03eea94f33df7
-
SHA512
31e9f7e14b93367849a5eb08aec84485e51e7c8b29fe5049671d1886e2582f185f1034f0860e5e3f45960c257da446a0edc049870e7f738a47e54cf6e42b1e31
-
SSDEEP
3072:wZNYDWk2ganZERnq/p4lmaD5XfWNXBp3rq4c9n9GE:0Y6yanZmop2+xler
Malware Config
Signatures
Files
-
aa7ff7cfe4e452cb0c9ca62f36b717ca0c7dd8856f145f6732e03eea94f33df7.dll windows x86
4b8abd9b2dd87b0591cf000853d22927
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalAlloc
GetDriveTypeW
lstrlenW
GetCurrentProcess
GetProcAddress
OpenProcess
UnhandledExceptionFilter
GetProcessHeap
InterlockedIncrement
MultiByteToWideChar
GetACP
ExitProcess
HeapDestroy
SetHandleCount
GetFileType
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
WriteFile
InterlockedCompareExchange
Sleep
InterlockedExchange
LocalFree
GetLocaleInfoA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
HeapSize
GetCPInfo
GetOEMCP
GetLastError
GetStartupInfoA
GetModuleHandleA
VirtualQuery
GetSystemInfo
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
RtlUnwind
HeapFree
HeapAlloc
WideCharToMultiByte
GetVersionExA
LoadLibraryW
SetUnhandledExceptionFilter
TerminateProcess
FreeLibrary
WaitForSingleObject
LocalReAlloc
LoadLibraryA
CloseHandle
GetVersionExW
GetCommandLineA
VirtualProtect
user32
DestroyWindow
IsWindow
SetWindowPos
GetClientRect
EndDialog
FrameRect
DrawFocusRect
InflateRect
DrawEdge
OffsetRect
GetSysColor
FillRect
GetSysColorBrush
EnableWindow
IsDlgButtonChecked
SetDlgItemInt
SetFocus
ExitWindowsEx
GetDlgItemInt
GetWindowRect
ShowWindow
GetWindowTextA
GetFocus
MapWindowPoints
ReleaseDC
GetDC
GetWindowThreadProcessId
IsWindowVisible
SetDlgItemTextA
GetDlgItemTextA
GetDlgItem
MessageBeep
CheckDlgButton
advapi32
AdjustTokenPrivileges
OpenProcessToken
LookupPrivilegeValueW
RegCloseKey
gdi32
SelectObject
SetBkMode
SetTextColor
CreateSolidBrush
DeleteObject
Rectangle
SetROP2
SetBkColor
Sections
.text Size: 64KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 40KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ