Static task
static1
Behavioral task
behavioral1
Sample
ec4d3f04fe63b0d48ea97d98e414525f8522ed2f643967ed1f973882de9423db.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ec4d3f04fe63b0d48ea97d98e414525f8522ed2f643967ed1f973882de9423db.dll
Resource
win10v2004-20220812-en
General
-
Target
ec4d3f04fe63b0d48ea97d98e414525f8522ed2f643967ed1f973882de9423db
-
Size
1.2MB
-
MD5
0191c4eb63a7570cdc837d1e67b03ae0
-
SHA1
e212dfc41937dbda37daeee1661e44c76a4307e3
-
SHA256
ec4d3f04fe63b0d48ea97d98e414525f8522ed2f643967ed1f973882de9423db
-
SHA512
3571f3bb087f8d2225843c6f5a1220e023f9bb66cb9307860bfc847034afb03c59d706edf11d39ae16f1fe8642e3143a422afc758bb9f21a63bc866877778540
-
SSDEEP
24576:NbftwFiAciGs1rhlxaCsVb6KoTpZCFg6DTk1F2RjkjCQGbqzQC:8PWCsVb6KUpZ+hDg1F2d6+H
Malware Config
Signatures
Files
-
ec4d3f04fe63b0d48ea97d98e414525f8522ed2f643967ed1f973882de9423db.dll windows x86
6c7c31cde28938abead9dee5b70099d7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCPInfo
GetOEMCP
GetCurrentDirectoryA
HeapAlloc
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapFree
GetCommandLineA
RtlUnwind
RaiseException
HeapReAlloc
HeapSize
ExitProcess
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
VirtualFree
HeapCreate
HeapDestroy
GetStdHandle
GetACP
IsValidCodePage
LCMapStringA
GetLocaleInfoA
SetHandleCount
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetTimeZoneInformation
GetDriveTypeA
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
GetStringTypeA
GetStringTypeW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
InterlockedExchange
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpW
GetVersionExA
GetCurrentThreadId
GlobalAddAtomA
GetFullPathNameA
FlushFileBuffers
SetFilePointer
GlobalFlags
GlobalGetAtomNameA
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GetCurrentProcessId
GetModuleHandleW
CompareStringA
lstrcmpA
InterlockedDecrement
InterlockedIncrement
FindFirstFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileA
FindClose
GetLastError
SetLastError
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
GetCurrentProcess
FreeLibrary
LoadLibraryA
WriteFile
CreateFileA
DeleteFileA
MultiByteToWideChar
lstrlenA
GetModuleFileNameA
GetPrivateProfileStringA
WinExec
CloseHandle
VirtualFreeEx
ReadProcessMemory
WriteProcessMemory
VirtualAllocEx
OpenProcess
GetProcAddress
GetModuleHandleA
Sleep
WritePrivateProfileStringA
FindResourceA
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
LCMapStringW
CreateThread
user32
DestroyMenu
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
LoadIconA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
PostMessageA
GetClassInfoExA
GetClassInfoA
AdjustWindowRectEx
CopyRect
CallWindowProcA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
SetWindowsHookExA
CallNextHookEx
GetKeyState
PeekMessageA
ValidateRect
GetDlgItem
GetFocus
PostQuitMessage
DefWindowProcA
CreateWindowExA
SetWindowLongA
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
PtInRect
SetWindowTextA
GetParent
GetLastActivePopup
IsWindowEnabled
EnableWindow
MessageBoxA
UnhookWindowsHookEx
GetSystemMetrics
GetWindowLongA
SetLayeredWindowAttributes
ShowWindow
GetMessageA
TranslateMessage
DispatchMessageA
GetForegroundWindow
GetClassNameA
IsWindowVisible
SetForegroundWindow
SetWindowPos
FindWindowA
FindWindowExA
GetWindowThreadProcessId
SendMessageA
IsWindow
UpdateWindow
LoadCursorA
RegisterClassA
RegisterWindowMessageA
SendMessageTimeoutA
GetClientRect
SetActiveWindow
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
GetWindowTextA
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetMenu
gdi32
DeleteDC
CreateBitmap
ScaleWindowExtEx
SetWindowExtEx
ExtTextOutA
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
GetStockObject
TextOutA
RectVisible
PtVisible
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
DeleteObject
GetDeviceCaps
Escape
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegQueryValueExA
RegCloseKey
RegSetValueExA
RegOpenKeyA
shell32
SHGetSpecialFolderPathA
ShellExecuteA
shlwapi
PathFileExistsA
ole32
OleRun
CoUninitialize
CoCreateInstance
CLSIDFromProgID
CoInitialize
oleaut32
SysAllocString
VariantClear
VariantInit
VariantChangeType
SysFreeString
SysStringLen
Sections
.text Size: 157KB - Virtual size: 156KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 994KB - Virtual size: 993KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ