XZUYQ
Static task
static1
Behavioral task
behavioral1
Sample
be42bfad14a861bc7e00829bfa11feb6a0271d0b78616ad79383c7c2b44b84d4.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
be42bfad14a861bc7e00829bfa11feb6a0271d0b78616ad79383c7c2b44b84d4.dll
Resource
win10v2004-20220901-en
General
-
Target
be42bfad14a861bc7e00829bfa11feb6a0271d0b78616ad79383c7c2b44b84d4
-
Size
588KB
-
MD5
39bdc71957cde75bcfa02773ca06c610
-
SHA1
957301826791a84dc05ae4bacbb88debe0133626
-
SHA256
be42bfad14a861bc7e00829bfa11feb6a0271d0b78616ad79383c7c2b44b84d4
-
SHA512
c92509177576a27bee95aec4966c9e898c44b393192acbc1580362f283cd865d1a406d79948af820904272b6f69096c1f6930a2bd412560c6eb6574e5ae97d92
-
SSDEEP
6144:SuYSbtyznGWulG/nQ6YLlZc2HCpSpVPq7ktjgVoQhREUMPWrpSgb9u/:SuNtmulAnGHCSP7gVgDRGu/
Malware Config
Signatures
Files
-
be42bfad14a861bc7e00829bfa11feb6a0271d0b78616ad79383c7c2b44b84d4.dll windows x86
88145b217a48802ea36d08d9769d2c14
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
CreateDirectoryA
lstrcatA
lstrcpyA
WritePrivateProfileStringA
GetPrivateProfileStringA
GlobalUnlock
GlobalLock
LeaveCriticalSection
SetFilePointer
CreateFileA
CloseHandle
UnmapViewOfFile
MapViewOfFile
OpenFileMappingA
CreateFileMappingA
FreeLibrary
GetModuleHandleA
DisableThreadLibraryCalls
GetCurrentProcessId
VirtualAlloc
WriteProcessMemory
GetModuleFileNameA
GlobalAlloc
VirtualProtect
user32
GetWindowThreadProcessId
IsWindowVisible
IsWindow
GetTopWindow
CallNextHookEx
GetKeyState
RegisterClassExA
GetClassNameA
GetClassInfoExA
SetParent
MapWindowPoints
SetWindowPos
OpenClipboard
GetWindow
CloseClipboard
SendDlgItemMessageA
wsprintfA
GetDlgItemTextA
SetDlgItemTextA
IsDlgButtonChecked
CheckDlgButton
EnableWindow
SetWindowTextA
DestroyWindow
PostQuitMessage
GetWindowTextA
KillTimer
GetDlgItem
SendMessageA
ShowWindow
EmptyClipboard
GetWindowRect
SetClipboardData
advapi32
RegSetValueExA
RegOpenKeyA
RegCloseKey
comctl32
ord17
msvcrt
free
strstr
atoi
_beginthread
sprintf
??3@YAXPAX@Z
??2@YAPAXI@Z
malloc
_adjust_fdiv
_itoa
_initterm
ws2_32
send
shlwapi
PathFindFileNameA
PathRemoveFileSpecA
Exports
Exports
Sections
.XZUYQX Size: 224KB - Virtual size: 223KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text0 Size: 56KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text1 Size: 240KB - Virtual size: 238KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 52KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ