RPOAS
Static task
static1
Behavioral task
behavioral1
Sample
c01744e59b9a8872ce605ce4feb731f99b162d8592ca7e2398b4a524117c783a.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c01744e59b9a8872ce605ce4feb731f99b162d8592ca7e2398b4a524117c783a.dll
Resource
win10v2004-20220812-en
General
-
Target
c01744e59b9a8872ce605ce4feb731f99b162d8592ca7e2398b4a524117c783a
-
Size
180KB
-
MD5
0fc0fc105ac17ae40a5055fd8f73aa89
-
SHA1
120cc607fc236983c3e18483766e9ab05d15ccf8
-
SHA256
c01744e59b9a8872ce605ce4feb731f99b162d8592ca7e2398b4a524117c783a
-
SHA512
187e718cf627b0750c210e0f075a0774cda458b974bf2662ad3789f85e5e24a5c73067e92df3bdb63bcbdf77682ea4e810e7df8b0c67c45c3e6cfb9d30135609
-
SSDEEP
3072:GCiHBW4dH5Va4EZftMWT1wO4/e0Vk+ZxbJ9TJAZ06Wl+q0KQ266f/ijzthiogJXR:IhTVREJbOrDkmncZ06Wl1zQd6CDi9
Malware Config
Signatures
Files
-
c01744e59b9a8872ce605ce4feb731f99b162d8592ca7e2398b4a524117c783a.dll windows x86
7ff5c558086940d119255e1c81d11a8f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
GetSecurityDescriptorControl
RegDeleteValueW
UnlockServiceDatabase
RegQueryValueW
RegOpenKeyExA
RegSetValueExW
RegQueryValueExA
RegEnumValueA
version
GetFileVersionInfoA
VerQueryValueW
kernel32
RtlUnwind
GetStringTypeW
LCMapStringW
GetHandleInformation
LoadLibraryA
GetModuleHandleA
IsValidLocale
GetProcAddress
VirtualAlloc
IsBadStringPtrW
WideCharToMultiByte
WriteFile
HeapCreate
InitializeCriticalSection
GetLocalTime
LoadResource
SetCurrentDirectoryW
lstrcpynA
GlobalReAlloc
CreateThread
GetSystemTime
GlobalFree
GetTempFileNameA
GetSystemInfo
CreateProcessW
LoadLibraryExW
SetPriorityClass
FindResourceA
GetLocaleInfoA
InterlockedExchange
WriteConsoleA
GlobalHandle
lstrlenA
CompareStringW
GetTempPathW
GetStringTypeA
VirtualFree
LockResource
lstrlenW
WriteConsoleW
SetEndOfFile
FindResourceExW
SetStdHandle
FileTimeToLocalFileTime
IsBadReadPtr
IsValidCodePage
GetCurrentDirectoryW
InterlockedCompareExchange
GetVersion
CreateFileMappingA
lstrcmpW
GetCurrentThread
VirtualQuery
Sleep
GetThreadTimes
ReleaseMutex
lstrcpyW
ExitProcess
HeapAlloc
GetCommandLineA
EnterCriticalSection
LeaveCriticalSection
HeapDestroy
HeapFree
DeleteCriticalSection
FatalAppExitA
HeapReAlloc
IsBadWritePtr
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
CloseHandle
CreateFileA
UnhandledExceptionFilter
GetCPInfo
GetACP
GetOEMCP
FlushFileBuffers
ReadFile
SetFilePointer
MultiByteToWideChar
LCMapStringA
Exports
Exports
Sections
.text Size: 100KB - Virtual size: 98KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 52KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ