StartW
Static task
static1
Behavioral task
behavioral1
Sample
ab46cd9c8281c665c2400a14ead3a49eb3068b4871ef4b86513a009b20c28e0d.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ab46cd9c8281c665c2400a14ead3a49eb3068b4871ef4b86513a009b20c28e0d.dll
Resource
win10v2004-20220812-en
General
-
Target
ab46cd9c8281c665c2400a14ead3a49eb3068b4871ef4b86513a009b20c28e0d
-
Size
280KB
-
MD5
0a31b41b97eec43f1fa2f477dc881b35
-
SHA1
67310359595875992eec3f7cde96fd126e5a0f56
-
SHA256
ab46cd9c8281c665c2400a14ead3a49eb3068b4871ef4b86513a009b20c28e0d
-
SHA512
c19b13a0459102b927b0c85c36c26beaa5e11fa2bdad4c838871eb4f83885dec41f99b98b71806ebdd45d01137424672c4dac3c66ffc74e72ede4cedff1fdcbf
-
SSDEEP
6144:s17mLL5n8TUdKvQmiyncDjJeo6hyWeKVMrvKEtG3SrI:sxmLLJmiucDereNrvam
Malware Config
Signatures
Files
-
ab46cd9c8281c665c2400a14ead3a49eb3068b4871ef4b86513a009b20c28e0d.dll windows x64
a5d87012c3afc5ef7966216a69247cb2
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
HeapAlloc
FlsSetValue
GetCommandLineA
HeapFree
RaiseException
RtlPcToFileHeader
HeapReAlloc
Sleep
ExitProcess
HeapQueryInformation
HeapSize
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlCaptureContext
EncodePointer
DecodePointer
FlsGetValue
FlsFree
FlsAlloc
GetStdHandle
HeapSetInformation
HeapCreate
HeapDestroy
SetHandleCount
RtlUnwindEx
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetACP
IsValidCodePage
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
RtlLookupFunctionEntry
CreateFileA
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
WritePrivateProfileStringA
GetOEMCP
GetCPInfo
GlobalFlags
DeleteCriticalSection
LocalReAlloc
TlsSetValue
GlobalHandle
GlobalReAlloc
TlsAlloc
InitializeCriticalSection
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GetModuleHandleW
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
GetCurrentProcessId
GetModuleFileNameA
FreeResource
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
CompareStringA
LoadLibraryA
lstrcmpW
GetVersionExA
FreeLibrary
GetModuleHandleA
SetLastError
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
MultiByteToWideChar
MulDiv
lstrlenA
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
OpenProcess
SizeofResource
VirtualAlloc
GetLastError
GetModuleHandleExA
GetProcAddress
GetCurrentProcess
GetFileType
CloseHandle
user32
EndPaint
BeginPaint
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
ClientToScreen
DestroyMenu
LoadCursorA
GetDC
ReleaseDC
GetSysColorBrush
SetCursor
GetMessageA
TranslateMessage
ValidateRect
PostQuitMessage
GetDesktopWindow
GetActiveWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
IsWindowEnabled
ShowWindow
SetWindowTextA
IsDialogMessageA
SetMenuItemBitmaps
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
RegisterWindowMessageA
LoadIconA
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
GetClassLongPtrA
SetPropA
GetPropA
RemovePropA
GetFocus
IsWindow
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
DispatchMessageA
GetDlgItem
GetTopWindow
DestroyWindow
GetWindowLongPtrA
SetWindowLongPtrA
GetMessageTime
GetMessagePos
MapWindowPoints
GetKeyState
SetMenu
WindowFromPoint
EnableWindow
GetCursorPos
PeekMessageA
SetForegroundWindow
IsWindowVisible
UpdateWindow
GetClientRect
PostMessageA
MessageBoxA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
GetMenuCheckMarkDimensions
GetWindowThreadProcessId
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
UnhookWindowsHookEx
GetWindow
GetSystemMetrics
GetWindowRect
GetWindowPlacement
IsIconic
SystemParametersInfoA
SetWindowPos
AdjustWindowRectEx
GetParent
CopyRect
PtInRect
GetDlgCtrlID
SendMessageA
DefWindowProcA
CallWindowProcA
GetMenu
GetWindowLongA
SendDlgItemMessageA
gdi32
ScaleWindowExtEx
DeleteDC
GetStockObject
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
TextOutA
RectVisible
PtVisible
GetDeviceCaps
SetMapMode
RestoreDC
SaveDC
DeleteObject
ExtTextOutA
CreateBitmap
GetObjectA
SetBkColor
SetTextColor
GetClipBox
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shlwapi
PathFindExtensionA
oleaut32
VariantClear
VariantChangeType
VariantInit
Exports
Exports
Sections
.text Size: 159KB - Virtual size: 158KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ