Hello
Static task
static1
Behavioral task
behavioral1
Sample
3696f5f1883fed07d2ddd337b632878711f4fdc1581571217b10a704bd316155.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
3696f5f1883fed07d2ddd337b632878711f4fdc1581571217b10a704bd316155.dll
Resource
win10v2004-20221111-en
General
-
Target
3696f5f1883fed07d2ddd337b632878711f4fdc1581571217b10a704bd316155
-
Size
225KB
-
MD5
ddf676379aa5b9e144f80b144eab9893
-
SHA1
e35c3fb00952f73de54720974717948e854985e5
-
SHA256
3696f5f1883fed07d2ddd337b632878711f4fdc1581571217b10a704bd316155
-
SHA512
d6b83cf32d5fd9e3f33924dcfc1730b67be35c5a552bedf8345feaaa07460d6def7394e17db6530bb1b4a9a2c576d305b17da98807541753341961e02907927d
-
SSDEEP
6144:nuujjQiYiUYsnpjf6FwGWwV7Ikw+YgHPTya5Q:nuuPEcjWwpTw+YgH7ySQ
Malware Config
Signatures
Files
-
3696f5f1883fed07d2ddd337b632878711f4fdc1581571217b10a704bd316155.dll windows x86
15ff3390b357e716ffeebde70946abd1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleW
GetCurrentThread
CreateRemoteThread
OpenProcess
GlobalAlloc
WideCharToMultiByte
VirtualFreeEx
LoadLibraryW
FormatMessageW
CreateProcessA
GetSystemDirectoryA
IsBadStringPtrA
GetLastError
WaitForSingleObject
VirtualAllocEx
GlobalFree
LoadLibraryA
GetExitCodeThread
GetModuleHandleA
CloseHandle
OpenFileMappingA
WriteProcessMemory
ResumeThread
CreateFileW
WriteConsoleW
SetStdHandle
GetCurrentProcess
MapViewOfFile
GetProcAddress
GetSystemDefaultLangID
GetConsoleMode
GetConsoleCP
SetLastError
VirtualProtect
VirtualQuery
InterlockedCompareExchange
GetCurrentThreadId
SuspendThread
GetThreadContext
SetThreadContext
FlushInstructionCache
VirtualAlloc
VirtualFree
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
MultiByteToWideChar
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
HeapAlloc
GetCommandLineA
GetCPInfo
RaiseException
RtlUnwind
LCMapStringW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
HeapCreate
HeapDestroy
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
HeapSize
GetLocaleInfoW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetStringTypeW
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
HeapReAlloc
SetFilePointer
FlushFileBuffers
user32
MessageBeep
MessageBoxW
advapi32
LookupPrivilegeValueW
OpenProcessToken
AdjustTokenPrivileges
ws2_32
htons
Exports
Exports
Sections
.text Size: 158KB - Virtual size: 158KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.upx0 Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 434B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ