Static task
static1
Behavioral task
behavioral1
Sample
b4df9f322ab985980a8c737b28e3b759215b26984b9bb19703309df803e29b10.dll
Resource
win7-20220812-en
General
-
Target
b4df9f322ab985980a8c737b28e3b759215b26984b9bb19703309df803e29b10
-
Size
236KB
-
MD5
209ee47e5908359ea7f4fb0e716bd070
-
SHA1
034391e90283fbe4897cc2f0042a510773015e7c
-
SHA256
b4df9f322ab985980a8c737b28e3b759215b26984b9bb19703309df803e29b10
-
SHA512
9b64284dbc0f568ead0c1cb22bf56e58981a50d20f4dfdfaa5fb87edea97c52151ec18ced444421302882b93a2e485a0b142291ab5fcff15ca58ec057c461f03
-
SSDEEP
3072:jKUHjPgLpk8fDfjwoz6lndvjBkRy8EEG0EiP0sgybIb7UeKZ9oezJ1Gye:RD9yDjj6ldvao3EG0EiP0VTbAe+9ogQ
Malware Config
Signatures
Files
-
b4df9f322ab985980a8c737b28e3b759215b26984b9bb19703309df803e29b10.dll windows x86
c5b5a649d9aefe570d326b60f7e7fbf8
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DisableThreadLibraryCalls
TerminateProcess
GetCurrentProcess
WaitForSingleObject
SetEvent
CloseHandle
OpenEventW
GetModuleFileNameW
GetLastError
UnmapViewOfFile
MapViewOfFile
OpenFileMappingA
GetCurrentThread
LoadLibraryW
FreeLibrary
GetProcAddress
GetTickCount
ResumeThread
CreateProcessA
CreateProcessW
FlushFileBuffers
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
LCMapStringW
LCMapStringA
GetStringTypeW
MultiByteToWideChar
GetStringTypeA
GetLocaleInfoA
VirtualQuery
VirtualProtect
VirtualAlloc
InterlockedCompareExchange
GetCurrentThreadId
FlushInstructionCache
SetThreadContext
GetThreadContext
SuspendThread
SetLastError
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
RaiseException
RtlUnwind
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
InterlockedDecrement
Sleep
HeapSize
ExitProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
WriteFile
LoadLibraryA
InitializeCriticalSection
SetFilePointer
GetConsoleCP
GetConsoleMode
ws2_32
bind
recvfrom
WSARecvFrom
sendto
WSASendTo
WSAGetLastError
ntohl
ntohs
getsockopt
connect
accept
getpeername
htons
htonl
inet_ntoa
WSAIoctl
gethostbyname
gethostname
Sections
.text Size: 71KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text Size: 125KB - Virtual size: 128KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE