Static task
static1
Behavioral task
behavioral1
Sample
55bc2cfaeedf04b73b9a8c9e6b46af15ce782f570b2a9506b96d8b428b30460b.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
55bc2cfaeedf04b73b9a8c9e6b46af15ce782f570b2a9506b96d8b428b30460b.dll
Resource
win10v2004-20220812-en
General
-
Target
55bc2cfaeedf04b73b9a8c9e6b46af15ce782f570b2a9506b96d8b428b30460b
-
Size
36KB
-
MD5
835d768b89a598ba01ad897793adf155
-
SHA1
0d908c894e8211ea5e429388a0245cb5ee066edb
-
SHA256
55bc2cfaeedf04b73b9a8c9e6b46af15ce782f570b2a9506b96d8b428b30460b
-
SHA512
348ad79c7be18389fb8b3fef83be78c8b71fa84e5387c12913902db4508610223edafae102e7ccd1410f54072af0cdc814d0ec9e4b17bacc814d2f5a08b38b27
-
SSDEEP
768:GM/fZYeYZ/OgqAQ/EZAxHDUHqdz7TkovY:5faLZm9A7ZuJdz7TXvY
Malware Config
Signatures
Files
-
55bc2cfaeedf04b73b9a8c9e6b46af15ce782f570b2a9506b96d8b428b30460b.dll windows x86
6e8ff33851737c62135be3da931062ef
Code Sign
57:94:71:11:1d:3a:8c:b3:4b:67:fb:eb:0b:04:b5:02Certificate
IssuerCN=Root AgencyNot Before06/05/2010, 06:41Not After31/12/2039, 23:59SubjectCN=Microsofft VMM模块Signer
Actual PE DigestDigest AlgorithmPE Digest MatchesfalseHeaders
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LeaveCriticalSection
EnterCriticalSection
GetCurrentThreadId
InitializeCriticalSection
HeapDestroy
DeleteCriticalSection
FlushInstructionCache
GetCurrentProcess
InterlockedDecrement
InterlockedIncrement
GetTickCount
Sleep
lstrcatA
DisableThreadLibraryCalls
GetFileAttributesA
GetWindowsDirectoryA
GetShortPathNameA
DebugBreak
OutputDebugStringA
lstrcpynA
lstrcpynW
GetModuleFileNameA
lstrlenA
LoadLibraryA
GetVersionExA
GetProcAddress
GetSystemDirectoryA
user32
IsWindow
MapWindowPoints
PtInRect
RemoveMenu
InvalidateRect
GetMonitorInfoA
MonitorFromPoint
CharNextA
wvsprintfA
CallWindowProcA
GetWindowLongA
DefWindowProcA
GetTopWindow
TrackPopupMenuEx
CreatePopupMenu
GetMenuItemCount
ShowWindow
FindWindowA
LoadAcceleratorsA
DestroyMenu
GetMenuItemInfoA
GetClassNameA
GetParent
GetWindow
SendMessageA
GetWindowTextA
GetCursorPos
mouse_event
GetWindowRect
SetCursorPos
GetDesktopWindow
SetForegroundWindow
KillTimer
PostMessageA
GetLastInputInfo
SetTimer
TranslateAcceleratorA
GetClassInfoExA
LoadCursorA
wsprintfA
LoadImageA
RegisterClassExA
SetWindowLongA
DestroyWindow
CreateWindowExA
PeekMessageA
GetMessageA
TranslateMessage
MessageBeep
AppendMenuA
GetClientRect
PostQuitMessage
LoadStringW
SetFocus
DispatchMessageA
LoadStringA
LoadMenuA
SetWindowPos
advapi32
RegCloseKey
RegCreateKeyExA
RegSetValueExA
RegOpenKeyA
RegQueryValueExA
shell32
ShellExecuteA
SHGetSpecialFolderPathA
ole32
OleUninitialize
OleInitialize
msvcrt
memset
atoi
isdigit
wcslen
strstr
strcat
strcmp
time
_initterm
memmove
realloc
??3@YAXPAX@Z
memcpy
??2@YAPAXI@Z
free
__CxxFrameHandler
strrchr
strcpy
strlen
malloc
_adjust_fdiv
_purecall
shlwapi
PathFindFileNameA
Exports
Exports
Aetxml
BetDml
DllRundll
GetDDaa
setxml
sssweew
Sections
.text Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 748B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ