Static task
static1
Behavioral task
behavioral1
Sample
4c7983e2e0d58d9958bfcd3a7d025c1897db664d739d84e4b0ac7c4617fe0101.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4c7983e2e0d58d9958bfcd3a7d025c1897db664d739d84e4b0ac7c4617fe0101.dll
Resource
win10v2004-20220812-en
General
-
Target
4c7983e2e0d58d9958bfcd3a7d025c1897db664d739d84e4b0ac7c4617fe0101
-
Size
36KB
-
MD5
20200d5b24c3aec1ca770e118bc7802b
-
SHA1
788330ee6e980bc745bbf465a7905ae9bee88562
-
SHA256
4c7983e2e0d58d9958bfcd3a7d025c1897db664d739d84e4b0ac7c4617fe0101
-
SHA512
c73df6e229e91e1728c14cc39bbee43c074e2d56f3c383446fce2e67141f6981cd7d0f05845c59941f79d1f6fd57ba56c73c9c6b4bbc576fc99bae7faad353d4
-
SSDEEP
384:SqvzmT/eXgz90l6cR4EUAZkgfrnl8rJl3HRYp9mHRYkX8kmb957WcChWEMn6:tzGjw4EDkY2l3+pQOkMkmcxMn6
Malware Config
Signatures
Files
-
4c7983e2e0d58d9958bfcd3a7d025c1897db664d739d84e4b0ac7c4617fe0101.dll windows x86
dfb1eb919d42557710ef7f07f4b71e8a
Code Sign
2e:6b:7d:3a:9d:3a:ed:49:b6:09:76:c0:dd:d3:3f:9bCertificate
IssuerCN=Root AgencyNot Before04/02/2010, 02:32Not After31/12/2039, 23:59SubjectCN=WindowsCorporaton 模块Signer
Actual PE DigestDigest AlgorithmPE Digest MatchesfalseHeaders
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedDecrement
InterlockedIncrement
lstrlenA
GetModuleFileNameA
HeapDestroy
DeleteCriticalSection
DisableThreadLibraryCalls
InitializeCriticalSection
FlushInstructionCache
GetCurrentProcess
GetTickCount
Sleep
lstrcatA
LoadLibraryA
GetFileAttributesA
GetWindowsDirectoryA
GetShortPathNameA
DebugBreak
OutputDebugStringA
lstrcpynW
lstrcpynA
GetProcAddress
GetVersionExA
EnterCriticalSection
GetCurrentThreadId
LeaveCriticalSection
GetSystemDirectoryA
user32
DestroyMenu
GetMenuItemInfoA
AppendMenuA
GetMenuItemCount
CreatePopupMenu
TrackPopupMenuEx
GetMonitorInfoA
MonitorFromPoint
IsWindow
MapWindowPoints
MessageBeep
RemoveMenu
CallWindowProcA
GetWindowLongA
GetTopWindow
GetClassNameA
GetParent
GetWindow
PtInRect
InvalidateRect
DispatchMessageA
TranslateMessage
GetMessageA
CharNextA
SetWindowPos
SendMessageA
GetWindowTextA
GetCursorPos
GetWindowRect
SetCursorPos
mouse_event
KillTimer
PostMessageA
GetLastInputInfo
SetTimer
DefWindowProcA
TranslateAcceleratorA
GetClassInfoExA
LoadCursorA
wsprintfA
LoadImageA
RegisterClassExA
SetWindowLongA
CreateWindowExA
LoadStringA
LoadMenuA
SetFocus
PostQuitMessage
wvsprintfA
GetClientRect
LoadAcceleratorsA
DestroyWindow
FindWindowA
ShowWindow
PeekMessageA
LoadStringW
advapi32
RegCloseKey
RegCreateKeyExA
RegSetValueExA
RegOpenKeyA
RegQueryValueExA
shell32
ShellExecuteA
ole32
OleUninitialize
OleInitialize
msvcrt
atoi
isdigit
wcslen
strstr
_initterm
_purecall
??2@YAPAXI@Z
memmove
realloc
__CxxFrameHandler
strrchr
??3@YAXPAX@Z
free
malloc
_adjust_fdiv
time
Exports
Exports
Aetxml
BetDml
DllRundll
SetDaa
setxml
sssweew
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 716B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ