Static task
static1
Behavioral task
behavioral1
Sample
1a59b39874cebe4726eb3b6bcd0a076af222d452537e4b73cdfdde4c6277550a.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1a59b39874cebe4726eb3b6bcd0a076af222d452537e4b73cdfdde4c6277550a.dll
Resource
win10v2004-20220812-en
General
-
Target
1a59b39874cebe4726eb3b6bcd0a076af222d452537e4b73cdfdde4c6277550a
-
Size
175KB
-
MD5
40fe7de3ffdd46358bca948661d6e660
-
SHA1
b1844704912d58ca9a168397797086fde1d89eab
-
SHA256
1a59b39874cebe4726eb3b6bcd0a076af222d452537e4b73cdfdde4c6277550a
-
SHA512
6e3d8ab37b960929e41b35601eb8d96dd451c049e1c1838f9846a4936dc6741e4fdf47e7011703f74ac0100a990659f29bf8a8399f13f716a5c2633700ca1da1
-
SSDEEP
3072:ZDTeGF7Ms6wUDrhou9pFaN9tEowIzS8zlXZU54JZIymM2U6k2X94hW2otKUgwXYN:8iMs6Bhouj/o1OA5ZUa8MX29vOUgwI
Malware Config
Signatures
Files
-
1a59b39874cebe4726eb3b6bcd0a076af222d452537e4b73cdfdde4c6277550a.dll windows x86
711210a82a861d0ccd25ff9bc5de16f3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLogicalDrives
FreeLibrary
LeaveCriticalSection
GetProcAddress
EnterCriticalSection
SetLastError
LocalFree
LocalAlloc
CloseHandle
SetEndOfFile
SetFilePointer
CreateFileW
lstrcmpW
DeleteFileW
SetFileAttributesW
GetFileAttributesW
WaitForSingleObject
FindClose
FindNextFileW
FindFirstFileW
SetErrorMode
GetCurrentProcessId
CreateDirectoryW
GetTempPathW
LoadLibraryExW
GetCurrentProcess
CompareFileTime
GetDriveTypeW
GetExitCodeProcess
FindResourceW
WaitForMultipleObjects
GlobalLock
GlobalUnlock
LoadLibraryW
GetModuleHandleW
WideCharToMultiByte
ChangeTimerQueueTimer
CreateFileA
DeviceIoControl
InterlockedCompareExchange
GetProcessHeap
FormatMessageW
ExpandEnvironmentStringsW
MultiByteToWideChar
QueueUserWorkItem
InitializeCriticalSection
InterlockedIncrement
InterlockedDecrement
GetCurrentThreadId
GlobalFree
lstrcpyW
Sleep
GlobalAlloc
GetComputerNameW
GetSystemDirectoryW
GetLastError
lstrcmpiW
lstrlenW
CreateProcessW
GetWindowsDirectoryW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
HeapAlloc
HeapFree
GetTickCount
GetCommandLineA
SystemTimeToFileTime
VirtualProtect
user32
GetParent
SetTimer
RegisterClipboardFormatW
EnableWindow
MessageBoxW
GetLastActivePopup
LoadStringW
SendMessageW
wsprintfW
SendDlgItemMessageW
EndDialog
SetWindowPos
SetFocus
MoveWindow
GetWindowRect
GetDesktopWindow
GetDlgItemTextW
SetForegroundWindow
KillTimer
SetDlgItemTextW
LoadIconW
SetWindowTextW
DialogBoxParamW
GetDlgItem
SetWindowLongW
GetWindowLongW
WinHelpW
advapi32
RegEnumKeyW
CryptGenRandom
RegEnumValueW
CryptAcquireContextW
RegQueryInfoKeyW
RegCreateKeyExW
DuplicateTokenEx
ImpersonateLoggedOnUser
RevertToSelf
RegCloseKey
RegQueryValueExW
RegSetValueExW
RegOpenKeyExW
CryptReleaseContext
ole32
CoTaskMemFree
ReleaseStgMedium
CoCreateInstance
CoInitializeEx
CoUninitialize
CLSIDFromString
rpcrt4
RpcBindingSetAuthInfoExW
RpcBindingFree
RpcBindingFromStringBindingW
RpcRevertToSelf
msvcrt
wcscmp
_adjust_fdiv
malloc
_initterm
free
sprintf
wcsncmp
memmove
wcscat
wcsncpy
_wtol
_itow
_ltow
wcscpy
memset
_wcsicmp
wcschr
wcslen
wcsrchr
_vsnwprintf
_wtoi
_wcsnicmp
_except_handler3
??3@YAXPAX@Z
__CxxFrameHandler
msvcp60
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@0@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@PBD@Z
??8std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@0@Z
??Mstd@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@0@Z
??Ostd@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@0@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
Sections
.text Size: 103KB - Virtual size: 102KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 34KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ