GetNewInf
Static task
static1
Behavioral task
behavioral1
Sample
cfc56ce6dda38b6b6743493bc68e5caca811e2b8c0186f36bede2d90733ff073.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cfc56ce6dda38b6b6743493bc68e5caca811e2b8c0186f36bede2d90733ff073.dll
Resource
win10v2004-20220812-en
General
-
Target
cfc56ce6dda38b6b6743493bc68e5caca811e2b8c0186f36bede2d90733ff073
-
Size
288KB
-
MD5
4043ab18154601c9d99b1790734b325b
-
SHA1
6e9d4e07a800346845ab2e91d21dbd525d3f941f
-
SHA256
cfc56ce6dda38b6b6743493bc68e5caca811e2b8c0186f36bede2d90733ff073
-
SHA512
fb338c3b7709f288fa785c7a6b5648fa68d956dc76f33faee1c26c351f850d265ee07434df0584d2ec017032a1bbc386b7e283cbc9a8669a888088bd79e65045
-
SSDEEP
3072:NeNul+50jQGqqDtdfF4Jz7EwH+Ihnm5xJNjp5SH6qPM85oiUGr7Qw6pZAr11:3PDtd9iNHPnm5LUa8NXQLp4
Malware Config
Signatures
Files
-
cfc56ce6dda38b6b6743493bc68e5caca811e2b8c0186f36bede2d90733ff073.dll windows x86
907e0b89b0d1be2f237060945f605c5f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetACP
GetTimeZoneInformation
VirtualFree
VirtualAlloc
IsBadWritePtr
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
HeapSize
LCMapStringA
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
RaiseException
TerminateProcess
ExitProcess
GetCommandLineA
RtlUnwind
FileTimeToLocalFileTime
FileTimeToSystemTime
GetFileTime
GetFileSize
GetFileAttributesA
GetOEMCP
GetCPInfo
GetProcessVersion
WritePrivateProfileStringA
GlobalFlags
SetErrorMode
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
LeaveCriticalSection
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalFree
LocalAlloc
MulDiv
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
HeapAlloc
CreateFileA
GetCurrentProcess
DuplicateHandle
GetLastError
SetLastError
lstrcpynA
GlobalFree
LoadLibraryA
FreeLibrary
FindResourceA
LoadResource
LockResource
GetVersion
lstrcatA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
lstrcpyA
GetModuleHandleA
GetProcAddress
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
InterlockedDecrement
InterlockedIncrement
CloseHandle
GetModuleFileNameA
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
GlobalUnlock
GlobalReAlloc
HeapFree
HeapReAlloc
GetProcessHeap
user32
MapWindowPoints
SendDlgItemMessageA
LoadIconA
IsDialogMessageA
SetWindowTextA
ShowWindow
CreateDialogIndirectParamA
EndDialog
CharUpperA
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
UnregisterClassA
GetClassNameA
PtInRect
GetSysColorBrush
LoadStringA
DestroyMenu
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetDlgItem
GetWindowTextLengthA
GetWindowTextA
SetActiveWindow
DestroyWindow
CreateWindowExA
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetSystemMetrics
GetDC
ReleaseDC
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
PeekMessageA
SetWindowsHookExA
GetLastActivePopup
IsWindowEnabled
MessageBoxA
SetCursor
PostQuitMessage
OffsetRect
GetTopWindow
GetWindow
IsWindowVisible
SendMessageA
GetFocus
InvalidateRect
EnableWindow
wsprintfA
GetParent
IntersectRect
IsRectEmpty
RedrawWindow
UpdateWindow
ClientToScreen
FillRect
LoadCursorA
KillTimer
SetTimer
SetFocus
GetDlgCtrlID
AdjustWindowRectEx
GetCursorPos
ScreenToClient
PostMessageA
IsWindow
DestroyIcon
GetWindowLongA
SetWindowLongA
GetSysColor
GetClientRect
GetWindowRect
CopyRect
gdi32
SetWindowExtEx
ScaleWindowExtEx
DeleteObject
ScaleViewportExtEx
GetDeviceCaps
CreateSolidBrush
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetBkMode
SelectObject
RestoreDC
SaveDC
DeleteDC
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
GetCurrentObject
GetStockObject
CreateFontIndirectA
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegCreateKeyExA
RegOpenKeyExA
RegSetValueExA
RegCloseKey
comctl32
ImageList_SetBkColor
ImageList_Destroy
ImageList_GetImageInfo
ImageList_GetIcon
ImageList_ReplaceIcon
ImageList_Create
ImageList_LoadImageA
ImageList_Read
ord17
ImageList_GetImageCount
ImageList_Duplicate
Exports
Exports
Sections
.text Size: 156KB - Virtual size: 155KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 48KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ