Static task
static1
Behavioral task
behavioral1
Sample
15ab680d1ed2912dc4686bd49b309ac5db18dd32f4b718120d59cd8484c14d52.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
15ab680d1ed2912dc4686bd49b309ac5db18dd32f4b718120d59cd8484c14d52.dll
Resource
win10v2004-20220812-en
General
-
Target
15ab680d1ed2912dc4686bd49b309ac5db18dd32f4b718120d59cd8484c14d52
-
Size
32KB
-
MD5
8b5689a9e287a984f95ad1fb1657b522
-
SHA1
14291e333aa4a7c371398488127f6d91915d4809
-
SHA256
15ab680d1ed2912dc4686bd49b309ac5db18dd32f4b718120d59cd8484c14d52
-
SHA512
89ba8e35124a5edd9891c82faa866c4591852bea8143322cb76cf4c947e8231f08d1d71fd1c69fc497f0e91bfc3711e0cd41181a5cda27b2e31f85a8d47af7d5
-
SSDEEP
768:15uX2xlFvVu3z53BWlhCHfcDloeDzjHjJdHBi/vQfDZ7W55iin:1EyviWXCWltLHHBi/v6RW5X
Malware Config
Signatures
Files
-
15ab680d1ed2912dc4686bd49b309ac5db18dd32f4b718120d59cd8484c14d52.dll windows x86
43b9251f5b45d71ed5232fec4e53269f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
GetVersion
GetStartupInfoA
MulDiv
VirtualAlloc
VirtualProtect
DosDateTimeToFileTime
IsBadWritePtr
InterlockedExchangeAdd
LoadLibraryA
GetVersionExA
Sleep
QueryPerformanceFrequency
IsDebuggerPresent
IsBadCodePtr
IsBadStringPtrA
SetLastError
GetProcessHeap
user32
IsWindowUnicode
GetWindowContextHelpId
GetWindowTextLengthA
GetWindowTextA
IsCharAlphaNumericA
IsCharAlphaA
GetWindowRgn
IsClipboardFormatAvailable
WindowFromDC
GetForegroundWindow
CopyIcon
GetAncestor
GetTitleBarInfo
GetLastActivePopup
GetTopWindow
IsZoomed
IsWindowVisible
GetGUIThreadInfo
GetParent
GetDesktopWindow
IsMenu
BlockInput
InSendMessage
GetWindowRect
advapi32
InitializeSecurityDescriptor
AreAnyAccessesGranted
IsValidSid
RevertToSelf
msvcrt
_adjust_fdiv
_initterm
free
_memicmp
srand
_ltoa
div
_CIpow
_CIfmod
_CItanh
ceil
__doserrno
_errno
__mb_cur_max
_pctype
malloc
floor
localeconv
_isctype
gdi32
GetPixel
GetStretchBltMode
GdiFlush
GdiGetBatchLimit
GetBkColor
ole32
CoGetCurrentProcess
shell32
ord66
Sections
.text Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 70KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ