Static task
static1
Behavioral task
behavioral1
Sample
4bd5b13106b1e3bf4c5b789f86ddbe221c9c3d2d7507829134b61550077c213f.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4bd5b13106b1e3bf4c5b789f86ddbe221c9c3d2d7507829134b61550077c213f.dll
Resource
win10v2004-20220901-en
General
-
Target
4bd5b13106b1e3bf4c5b789f86ddbe221c9c3d2d7507829134b61550077c213f
-
Size
170KB
-
MD5
221a2089cf000a25b3a41df426b6e9b0
-
SHA1
4c96485a05d0c42d90d57b28b236d67b3f21d0f6
-
SHA256
4bd5b13106b1e3bf4c5b789f86ddbe221c9c3d2d7507829134b61550077c213f
-
SHA512
7129fe016ea20d9c5d12eba8606c6eaa840bcba041c518fea43f1d62eb06fadd44e2d25bc71287da6ee67bf63d1e4ff5d5e6630501349adf255014fd24681224
-
SSDEEP
3072:1EyXXC4tLhinKKEZ4xgYLQw0glW8vPMNTbo8jxhsienLT9Uw9u4mqr4dT:/CKLzLqZLb3ldvPd4Sdf9X9sXZ
Malware Config
Signatures
Files
-
4bd5b13106b1e3bf4c5b789f86ddbe221c9c3d2d7507829134b61550077c213f.dll windows x86
43b9251f5b45d71ed5232fec4e53269f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
GetVersion
GetStartupInfoA
MulDiv
VirtualAlloc
VirtualProtect
DosDateTimeToFileTime
IsBadWritePtr
InterlockedExchangeAdd
LoadLibraryA
GetVersionExA
Sleep
QueryPerformanceFrequency
IsDebuggerPresent
IsBadCodePtr
IsBadStringPtrA
SetLastError
GetProcessHeap
user32
IsWindowUnicode
GetWindowContextHelpId
GetWindowTextLengthA
GetWindowTextA
IsCharAlphaNumericA
IsCharAlphaA
GetWindowRgn
IsClipboardFormatAvailable
WindowFromDC
GetForegroundWindow
CopyIcon
GetAncestor
GetTitleBarInfo
GetLastActivePopup
GetTopWindow
IsZoomed
IsWindowVisible
GetGUIThreadInfo
GetParent
GetDesktopWindow
IsMenu
BlockInput
InSendMessage
GetWindowRect
advapi32
InitializeSecurityDescriptor
AreAnyAccessesGranted
IsValidSid
RevertToSelf
msvcrt
_adjust_fdiv
_initterm
free
_memicmp
srand
_ltoa
div
_CIpow
_CIfmod
_CItanh
ceil
__doserrno
_errno
__mb_cur_max
_pctype
malloc
floor
localeconv
_isctype
gdi32
GetPixel
GetStretchBltMode
GdiFlush
GdiGetBatchLimit
GetBkColor
ole32
CoGetCurrentProcess
shell32
ord66
Sections
.text Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 70KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ