Static task
static1
Behavioral task
behavioral1
Sample
31f6d2322049d32ddeacb70fdb0c5956e23a1318a07d0b63c75d734db77f21ae.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
31f6d2322049d32ddeacb70fdb0c5956e23a1318a07d0b63c75d734db77f21ae.dll
Resource
win10v2004-20220812-en
General
-
Target
31f6d2322049d32ddeacb70fdb0c5956e23a1318a07d0b63c75d734db77f21ae
-
Size
28KB
-
MD5
2bfebd7aa533f76164b2c0ebe366fa50
-
SHA1
3b274f6f9e1b089ff9185f3d58d630152070316e
-
SHA256
31f6d2322049d32ddeacb70fdb0c5956e23a1318a07d0b63c75d734db77f21ae
-
SHA512
a98e3ace79796cf224893cfc2dab92a06b72fa004f8997cc08ab7d431d74ad49167756cbd9378f4bbfa9f1d994ee97714f5b106fdecd640eb93a86617e9e92b1
-
SSDEEP
192:72zyxekVtwi3MJs5wKPfEQBu4PfuBBQ6PRQkn8vs1Pm:aVI95v1B3fuBBQARQkys1Pm
Malware Config
Signatures
Files
-
31f6d2322049d32ddeacb70fdb0c5956e23a1318a07d0b63c75d734db77f21ae.dll windows x86
f23f2946fe492af6786715eb1de66ebb
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CreateFileA
CreateThread
GetCurrentProcess
GetCurrentProcessId
GetExitCodeThread
GetFileSize
GetModuleFileNameA
GetModuleHandleA
GlobalAlloc
GlobalFree
ReadFile
ReadProcessMemory
RtlZeroMemory
Sleep
VirtualAlloc
VirtualFree
VirtualProtectEx
VirtualQueryEx
WaitForSingleObject
WriteProcessMemory
lstrcatA
lstrcmpA
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
GetProcAddress
LoadLibraryA
user32
GetWindowLongA
GetWindowTextA
GetWindowThreadProcessId
EnumWindows
SetTimer
SetWindowLongA
CallWindowProcA
KillTimer
wsprintfA
wininet
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
msvcrt
memcmp
memcpy
ws2_32
send
Sections
.text Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 510B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ