Static task
static1
Behavioral task
behavioral1
Sample
e7f5d0e38e442f02b2e648105582735f418bc6e0d7041621801270810edb4c52.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e7f5d0e38e442f02b2e648105582735f418bc6e0d7041621801270810edb4c52.dll
Resource
win10v2004-20221111-en
General
-
Target
e7f5d0e38e442f02b2e648105582735f418bc6e0d7041621801270810edb4c52
-
Size
42KB
-
MD5
555a4811328d995a8446479cfb5c17cc
-
SHA1
97448813fe8d1472481509fe29a599a5abd1fd11
-
SHA256
e7f5d0e38e442f02b2e648105582735f418bc6e0d7041621801270810edb4c52
-
SHA512
a2194666333ecd7b5a8ac66ad91721fed39db57ff0ae37e6044e46b79fdc08e744814535439fdd918651e7161e9c977b108e03cd717198054d2914ab53b2e5fa
-
SSDEEP
768:KIbu3+a5Z32RkdGie1Ynxw0LXxbPa7K5mUZKjVpNSn0yQ721o9m:HS32Rk37w6XxbC7Amlh8rgIo4
Malware Config
Signatures
Files
-
e7f5d0e38e442f02b2e648105582735f418bc6e0d7041621801270810edb4c52.dll windows x86
0ac611b97f12e72666488d7150430df8
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcessId
GetStringTypeA
LCMapStringW
GetCurrentThreadId
GetTickCount
GetStringTypeW
GetSystemTimeAsFileTime
GetProcAddress
LCMapStringA
MultiByteToWideChar
LoadLibraryA
GetOEMCP
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
HeapDestroy
HeapCreate
VirtualFree
HeapFree
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
WriteFile
HeapAlloc
VirtualAlloc
HeapReAlloc
GetCPInfo
GetACP
RtlUnwind
user32
GetForegroundWindow
wsprintfA
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
ole32
CoUninitialize
CoTaskMemAlloc
CoInitialize
Sections
.text Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ