EPScanEntry
Static task
static1
Behavioral task
behavioral1
Sample
51bc4172ea0c40ec0b40bbb276f7fc2dd002a0cb9451fa1a1d13f090694ba44b.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
51bc4172ea0c40ec0b40bbb276f7fc2dd002a0cb9451fa1a1d13f090694ba44b.dll
Resource
win10v2004-20220812-en
General
-
Target
51bc4172ea0c40ec0b40bbb276f7fc2dd002a0cb9451fa1a1d13f090694ba44b
-
Size
124KB
-
MD5
df543a4f96291a530169ee3e6195e480
-
SHA1
98d10f992b92e63adacca0f31a8888218055714f
-
SHA256
51bc4172ea0c40ec0b40bbb276f7fc2dd002a0cb9451fa1a1d13f090694ba44b
-
SHA512
1a42bfbd85405251a4dd820633b336a2e26247f17851ea1afd32cff53d6824495e8da32edde815a9b0c2621da27ee46d2f925f2dc8c956205e3b7b8dc409a03d
-
SSDEEP
3072:zIVW/iFVbQhRDB5ollrQsAdmYKyYJpoFYdS:qWqXbAt5EllAw0
Malware Config
Signatures
Files
-
51bc4172ea0c40ec0b40bbb276f7fc2dd002a0cb9451fa1a1d13f090694ba44b.dll windows x86
25bc6a806c1cb5418884e6b42ba817f5
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcatA
GetTempFileNameA
GlobalFree
GlobalUnlock
GlobalHandle
FindNextFileA
GlobalLock
GlobalAlloc
WaitForSingleObject
CloseHandle
CreateProcessA
GetShortPathNameA
ReadFile
SetFilePointer
CreateFileA
IsDBCSLeadByte
GetVersionExA
GetUserDefaultLCID
WriteFile
GetFileSize
DeleteFileA
GetDiskFreeSpaceA
GetModuleHandleA
lstrlenA
SetEndOfFile
GetStringTypeW
GetStringTypeA
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
FlushFileBuffers
SetStdHandle
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
GetCurrentProcess
TerminateProcess
GetOEMCP
GetCurrentDirectoryA
SetCurrentDirectoryA
FindFirstFileA
FindClose
GetProcAddress
GetModuleFileNameA
lstrcpyA
GetACP
GetCPInfo
LoadLibraryA
FreeLibrary
LCMapStringW
LCMapStringA
MultiByteToWideChar
WideCharToMultiByte
HeapAlloc
HeapFree
RtlUnwind
InterlockedDecrement
InterlockedIncrement
GetCommandLineA
GetVersion
RaiseException
EnterCriticalSection
LeaveCriticalSection
GetLastError
InitializeCriticalSection
HeapDestroy
HeapCreate
VirtualFree
DeleteCriticalSection
ExitProcess
VirtualAlloc
HeapReAlloc
IsBadWritePtr
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
user32
SendDlgItemMessageA
SetWindowLongA
LoadStringA
CharNextA
EndDialog
DialogBoxParamA
GetSystemMetrics
GetWindowRect
ShowWindow
GetDesktopWindow
SetWindowTextA
MessageBoxA
PeekMessageA
TranslateMessage
DispatchMessageA
SendMessageA
wsprintfA
IsDlgButtonChecked
GetDlgItemTextA
SetDlgItemTextA
SetWindowPos
GetWindowLongA
CheckDlgButton
GetDlgItem
EnableWindow
SetFocus
advapi32
RegOpenKeyExA
RegCloseKey
RegDeleteValueA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
shell32
SHGetPathFromIDListA
SHGetSpecialFolderLocation
SHGetMalloc
comctl32
PropertySheetA
CreatePropertySheetPageA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Exports
Exports
Sections
.text Size: 92KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 792B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ