Static task
static1
Behavioral task
behavioral1
Sample
42853216ab2ce70532ca300360917e8cc62ff1a1d3c6f8163effb3d0bb11461d.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
42853216ab2ce70532ca300360917e8cc62ff1a1d3c6f8163effb3d0bb11461d.dll
Resource
win10v2004-20220901-en
General
-
Target
42853216ab2ce70532ca300360917e8cc62ff1a1d3c6f8163effb3d0bb11461d
-
Size
218KB
-
MD5
0c48ab127a0886ee8972228d4e8501b0
-
SHA1
6760f02c1e8fa528022555ea7a4841bf457aca27
-
SHA256
42853216ab2ce70532ca300360917e8cc62ff1a1d3c6f8163effb3d0bb11461d
-
SHA512
1594a1809d1975e5decd9004a4bc912c12e667046d604010174ce0cd1f90567c6b4a70d038fb2ab3f83ca89d166d52c6db24dd10c00062a687e705ace228b71a
-
SSDEEP
3072:hZLJlCpYQIpP18HlZRt+340EhsCptz3PNBytPRYHa/wiDBuhG:TFMIpP18pY34VPmtuHa/wiI
Malware Config
Signatures
Files
-
42853216ab2ce70532ca300360917e8cc62ff1a1d3c6f8163effb3d0bb11461d.dll windows x86
ac52d79ccce22594a667800213ddaa23
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileW
CreateMutexW
CreateProcessW
CreateSemaphoreW
CreateThread
DeleteCriticalSection
DeleteFileW
DeviceIoControl
EnterCriticalSection
EraseTape
ExpandEnvironmentStringsW
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
FindFirstFileW
FindFirstVolumeMountPointW
FindNextFileW
FindNextVolumeMountPointW
FindResourceW
FindVolumeMountPointClose
FlushFileBuffers
FormatMessageW
FreeLibrary
GetComputerNameW
GetCurrentDirectoryA
GetCurrentDirectoryW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDateFormatW
GetDiskFreeSpaceExW
GetDriveTypeW
GetEnvironmentVariableW
GetExitCodeThread
GetFileAttributesW
GetFileInformationByHandle
GetLastError
GetLocalTime
GetLocaleInfoW
GetLogicalDriveStringsW
GetModuleFileNameW
GetModuleHandleA
GetNumberFormatW
GetPrivateProfileStringW
GetProcAddress
GetProcessHeap
GetStartupInfoW
GetSystemDirectoryW
CreateEventW
GetSystemTimeAsFileTime
GetTapeParameters
GetTapePosition
GetTapeStatus
GetTickCount
GetTimeFormatW
GetUserDefaultLCID
GetVersionExW
GetVolumeInformationW
GetVolumeNameForVolumeMountPointW
GetVolumePathNameW
GetWindowsDirectoryW
GlobalFree
HeapAlloc
HeapFree
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryW
LoadResource
LocalFree
LockResource
MultiByteToWideChar
PrepareTape
QueryPerformanceCounter
ReadFile
ReleaseMutex
ReleaseSemaphore
SetCurrentDirectoryW
SetEndOfFile
SetErrorMode
SetEvent
SetFileAttributesW
SetFilePointer
SetLastError
SetTapeParameters
SetTapePosition
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TerminateThread
UnhandledExceptionFilter
VerSetConditionMask
VerifyVersionInfoW
WaitForSingleObject
WriteFile
WritePrivateProfileStringW
WriteTapemark
LoadLibraryExW
CreateDirectoryW
CompareStringW
GetSystemTime
CloseHandle
user32
RegisterClassExW
LoadIconA
LoadIconW
LoadCursorA
gdi32
GetStockObject
advapi32
RegOpenKeyExA
Sections
.text4 Size: 512B - Virtual size: 100B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text3 Size: 512B - Virtual size: 100B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text1 Size: 512B - Virtual size: 100B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 167KB - Virtual size: 167KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 316B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss2 Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ