Static task
static1
Behavioral task
behavioral1
Sample
b3ba0e021da20665e60c7747c0592722c5728cec65736b7a700c511b14ee083a.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b3ba0e021da20665e60c7747c0592722c5728cec65736b7a700c511b14ee083a.dll
Resource
win10v2004-20220812-en
General
-
Target
b3ba0e021da20665e60c7747c0592722c5728cec65736b7a700c511b14ee083a
-
Size
157KB
-
MD5
080313a6f44016e63a9d4c84ac3d2ad0
-
SHA1
1fdc43bec18213244b197d7ffda840f62da23c25
-
SHA256
b3ba0e021da20665e60c7747c0592722c5728cec65736b7a700c511b14ee083a
-
SHA512
a1bde169767b8e627f2287ca0d6f76744219d9a1db092057992d582dccf1de2edd146636d8fe0d0eb909fa43a076ac283ee3fc71ed2d93465a86d4fee83701f2
-
SSDEEP
3072:7V+w4TY9ckCWTm/dqOiz6ppdYiYEfduevc6WZOnnJesL0KsLQp:7p4cqkCWi/vw6jGyFuejIknJeuWLQp
Malware Config
Signatures
Files
-
b3ba0e021da20665e60c7747c0592722c5728cec65736b7a700c511b14ee083a.dll windows x86
488eea61465f89198e617faeaafcf20f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CreateDirectoryA
EnterCriticalSection
EnumResourceLanguagesA
ExitProcess
GetCommandLineA
GetModuleHandleA
GetStartupInfoA
HeapAlloc
LeaveCriticalSection
MultiByteToWideChar
QueryPerformanceCounter
ReadFile
RemoveDirectoryA
RtlUnwind
SetLastError
SetUnhandledExceptionFilter
TlsGetValue
UnmapViewOfFile
lstrcmpA
lstrlenA
user32
MessageBoxA
MessageBoxIndirectA
EmptyClipboard
DefDlgProcA
advapi32
RegOpenKeyExA
RegLoadKeyA
RegEnumKeyA
ole32
CoUninitialize
OleInitialize
OleUninitialize
WriteFmtUserTypeStg
CoCreateGuid
CoCreateInstance
CoDisconnectObject
CoGetClassObject
CoInitialize
wininet
InternetSetFilePointer
InternetSetOptionExA
InternetWriteFile
InternetQueryDataAvailable
InternetGetLastResponseInfoA
InternetGetCookieA
InternetCrackUrlA
InternetConnectA
InternetCloseHandle
InternetCanonicalizeUrlA
HttpSendRequestA
HttpQueryInfoA
HttpOpenRequestA
HttpAddRequestHeadersA
InternetReadFile
shell32
SHFileOperationA
SHGetDesktopFolder
SHGetFileInfoA
SHGetMalloc
Shell_NotifyIconA
ShellExecuteW
ShellExecuteExW
ShellExecuteExA
ShellExecuteA
SHGetPathFromIDListA
SHBindToParent
Sections
.text Size: 13KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 25KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 100KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 15KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ