vuybunuudr
Static task
static1
Behavioral task
behavioral1
Sample
e0a0ff314e036587633beb7545d2a6c8b0d512508727c15e3b59ef153c40bca6.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e0a0ff314e036587633beb7545d2a6c8b0d512508727c15e3b59ef153c40bca6.dll
Resource
win10v2004-20221111-en
General
-
Target
e0a0ff314e036587633beb7545d2a6c8b0d512508727c15e3b59ef153c40bca6
-
Size
112KB
-
MD5
f53b71b358ed0fb47b9f680e2fb25bbc
-
SHA1
999e2a99013d0f4428587acfec1f4a3a55748882
-
SHA256
e0a0ff314e036587633beb7545d2a6c8b0d512508727c15e3b59ef153c40bca6
-
SHA512
27d8e25c33937988ba492ee86ba9f364221facc3ef1edb6796f3950c8860a8bc9926802abb339db9e3ae73525fc3e2d12fed1efce84699a4898b7a2f80dfac99
-
SSDEEP
3072:Vs1QVZSXlquu3XnW3+hX92+zHva29hJB:Vs1Q7SICEVFv
Malware Config
Signatures
Files
-
e0a0ff314e036587633beb7545d2a6c8b0d512508727c15e3b59ef153c40bca6.dll windows x86
7cfdb47b75d5565fdbf186308c4b0616
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCreateKeyW
RegOpenKeyExA
RegEnumValueW
RegFlushKey
version
GetFileVersionInfoSizeA
GetFileVersionInfoSizeW
VerQueryValueA
kernel32
RtlUnwind
LCMapStringW
LCMapStringA
MultiByteToWideChar
LoadLibraryA
GetProcAddress
IsValidLocale
GetModuleHandleA
GetHandleInformation
VirtualAlloc
LoadLibraryW
InterlockedIncrement
SearchPathW
GetVersionExA
RaiseException
ExpandEnvironmentStringsA
SetHandleCount
GetTempFileNameW
GetModuleFileNameW
GetTickCount
GlobalUnlock
EnumSystemLocalesA
CreateProcessW
GetACP
GetProcessHeap
ReleaseMutex
GetTempFileNameA
GlobalReAlloc
WideCharToMultiByte
GetFileTime
GetLastError
VirtualQuery
GetStdHandle
InitializeCriticalSection
CompareStringA
CreateProcessA
CreateEventA
FormatMessageA
CreateEventW
GetStringTypeW
GetTempPathA
GetVersion
FindResourceW
WriteConsoleW
GetCurrentDirectoryW
lstrcpynA
SetEvent
FindResourceExW
SetStdHandle
GetCurrentDirectoryA
HeapCreate
GetCurrentThread
SetEndOfFile
InterlockedExchange
WriteFile
LocalAlloc
SetEnvironmentVariableA
CreateFileMappingA
HeapAlloc
GetCPInfo
SizeofResource
GetLocaleInfoW
GetFileType
HeapDestroy
GetStringTypeA
GetLocaleInfoA
lstrlenW
GetShortPathNameW
CloseHandle
lstrcpynW
SetFilePointer
LoadLibraryExW
ExitThread
CreateFileA
WaitForSingleObject
SetThreadPriority
HeapSize
GlobalAlloc
GetTempPathW
SetCurrentDirectoryA
LeaveCriticalSection
IsValidCodePage
CompareStringW
GetSystemInfo
InterlockedCompareExchange
QueryPerformanceCounter
ExitProcess
GetSystemTime
GetCommandLineA
EnterCriticalSection
VirtualFree
HeapFree
DeleteCriticalSection
FatalAppExitA
HeapReAlloc
IsBadWritePtr
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
UnhandledExceptionFilter
GetOEMCP
FlushFileBuffers
ReadFile
Exports
Exports
Sections
.text Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 52KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ