Static task
static1
Behavioral task
behavioral1
Sample
40681d657c934a29aa5ff8dff88fb5b2d4d20c76c03aae955bfc3c33e109263e.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
40681d657c934a29aa5ff8dff88fb5b2d4d20c76c03aae955bfc3c33e109263e.dll
Resource
win10v2004-20220812-en
General
-
Target
40681d657c934a29aa5ff8dff88fb5b2d4d20c76c03aae955bfc3c33e109263e
-
Size
799KB
-
MD5
f197705950cfe78a632c6426e6be7c4e
-
SHA1
ca5ce515623f86f2029dc2d706b70e4d9df1d4d7
-
SHA256
40681d657c934a29aa5ff8dff88fb5b2d4d20c76c03aae955bfc3c33e109263e
-
SHA512
87c61b99dba56ec8589306d9df6f5e8ab5457ceb1822d3412f3853636fcff62b7c6bbc8d9c32f32c784749e33de3edf003972d4fbe01091e5836fdc31484ef06
-
SSDEEP
12288:xhzwa3eb1Afnb7u2OLlx9m9czXYcPK2hDd6ur5q/IecERN7pRKGYL3JpES/hE5Y:HXXvix49cbKA6ur5qg/eN9m3J62G
Malware Config
Signatures
Files
-
40681d657c934a29aa5ff8dff88fb5b2d4d20c76c03aae955bfc3c33e109263e.dll windows x86
e7f4363862c23548fae72da6733dc899
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileSize
DuplicateHandle
GetVolumeInformationA
GetFullPathNameA
LocalAlloc
TlsGetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
SetErrorMode
GetModuleHandleW
GlobalFlags
GetCPInfo
GetOEMCP
WritePrivateProfileStringA
GetCurrentDirectoryA
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
GetSystemTimeAsFileTime
ExitProcess
HeapFree
HeapAlloc
SetEnvironmentVariableA
SetCurrentDirectoryA
GetCommandLineA
HeapReAlloc
VirtualAlloc
SetEndOfFile
GetFileType
HeapSize
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetStdHandle
InitializeCriticalSectionAndSpinCount
HeapCreate
HeapDestroy
VirtualFree
SetHandleCount
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetConsoleCP
GetConsoleMode
GetTimeZoneInformation
GetDriveTypeA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringW
UnlockFile
LockFile
GetProcessHeap
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
MoveFileA
GetModuleFileNameW
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
InterlockedExchange
lstrcmpA
FindNextFileA
GetFileTime
GetFileSizeEx
GetFileAttributesA
FileTimeToLocalFileTime
FileTimeToSystemTime
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
FreeLibrary
CompareStringA
lstrcmpW
FreeResource
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
MulDiv
MultiByteToWideChar
Thread32First
Thread32Next
VirtualAllocEx
VirtualFreeEx
CreateRemoteThread
Process32First
Process32Next
OpenProcess
CreateToolhelp32Snapshot
Module32First
Module32Next
VirtualProtect
OutputDebugStringA
InterlockedDecrement
GetDiskFreeSpaceExA
CreateFileA
DeviceIoControl
InterlockedIncrement
DeleteCriticalSection
InitializeCriticalSection
UnmapViewOfFile
GetModuleFileNameA
lstrcmpiA
WriteProcessMemory
LoadLibraryA
GetProcAddress
SetLastError
GetLastError
GetVersionExA
GetLocalTime
TerminateThread
SetProcessWorkingSetSize
FindFirstFileA
FindClose
GetCurrentProcess
lstrlenA
TerminateProcess
GetCurrentProcessId
CreateFileMappingA
MapViewOfFile
WaitForSingleObject
GetModuleHandleA
IsBadReadPtr
IsBadWritePtr
GetTickCount
GetCurrentThreadId
DeleteFileA
CreateDirectoryA
Sleep
EnterCriticalSection
LeaveCriticalSection
CreateThread
CloseHandle
LoadResource
LockResource
SizeofResource
FindResourceA
SetStdHandle
WideCharToMultiByte
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
DestroyMenu
UnregisterClassA
CharUpperA
GetMessageA
TranslateMessage
ValidateRect
PostQuitMessage
GrayStringA
DrawTextExA
TabbedTextOutA
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
RegisterWindowMessageA
LoadIconA
SendDlgItemMessageA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetFocus
SetFocus
GetWindowTextLengthA
GetLastActivePopup
DispatchMessageA
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
GetKeyState
SetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
CopyRect
GetDlgCtrlID
GetMenu
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetDesktopWindow
GetActiveWindow
SetActiveWindow
SendMessageA
SetTimer
MapWindowPoints
GetSysColorBrush
CreateDialogIndirectParamA
DestroyWindow
GetDlgItem
IsWindowEnabled
GetNextDlgTabItem
EndDialog
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
SetCapture
ReleaseCapture
GetTopWindow
IsWindowVisible
EnableWindow
PtInRect
IsDlgButtonChecked
KillTimer
GetParent
mouse_event
GetWindowRect
GetCursorPos
GetClassNameA
GetWindow
GetClientRect
ReleaseDC
GetWindowDC
IsWindow
GetSystemMetrics
UpdateWindow
GetDC
ClientToScreen
ExitWindowsEx
SetForegroundWindow
SetWindowLongA
GetWindowLongA
CallNextHookEx
DefWindowProcA
BeginPaint
DrawTextA
EndPaint
LoadCursorA
SetCursor
ScreenToClient
InvalidateRect
GetWindowThreadProcessId
GetWindowTextA
PostMessageA
IsRectEmpty
MapVirtualKeyA
MessageBoxA
CallWindowProcA
SetWindowsHookExA
GetForegroundWindow
GetAsyncKeyState
gdi32
ScaleWindowExtEx
DeleteDC
GetStockObject
SetWindowExtEx
CreatePen
DPtoLP
SetWindowOrgEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
CreateSolidBrush
MoveToEx
LineTo
SetMapMode
RestoreDC
SaveDC
CreateBitmap
SetBkColor
GetClipBox
GetDeviceCaps
SetTextColor
SetBkMode
GetObjectA
CreateFontIndirectA
CreateCompatibleDC
CreateCompatibleBitmap
GetMapMode
GetWindowExtEx
GetViewportExtEx
GetWindowOrgEx
BitBlt
SelectObject
Ellipse
CreateFontA
PatBlt
DeleteObject
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
shell32
ShellExecuteA
shlwapi
PathFindFileNameA
PathStripToRootA
PathIsUNCA
PathFindExtensionA
ole32
CoInitialize
CoInitializeSecurity
CoCreateInstance
CoSetProxyBlanket
CoUninitialize
CoCreateGuid
oleaut32
SysAllocString
SysFreeString
VariantClear
VariantInit
VariantChangeType
winmm
timeGetTime
PlaySoundA
ws2_32
ntohl
htonl
Sections
.text Size: - Virtual size: 665KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bl0 Size: - Virtual size: 466KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bl1 Size: 792KB - Virtual size: 791KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 128B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 6KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ