Static task
static1
Behavioral task
behavioral1
Sample
7d7007db1a1d1d0733c2f3948f42513ceeaf3d706f0ce36ac8466d605419d9c7.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7d7007db1a1d1d0733c2f3948f42513ceeaf3d706f0ce36ac8466d605419d9c7.dll
Resource
win10v2004-20220812-en
General
-
Target
7d7007db1a1d1d0733c2f3948f42513ceeaf3d706f0ce36ac8466d605419d9c7
-
Size
41KB
-
MD5
5a3265e4001e266c91b4435f8b702ff0
-
SHA1
183133032c547128ba01a01178d8535287bd6c1b
-
SHA256
7d7007db1a1d1d0733c2f3948f42513ceeaf3d706f0ce36ac8466d605419d9c7
-
SHA512
e181918815717f36ad36af28249d13881287316ce524647cae34eb55aa10173c5a5cdaec46e34f9b873a8080955054f0af0a662903a3f1cb77840871f22b0aa8
-
SSDEEP
384:jylEZG9j0nciTTV+c7rQe+TA2Vf0DRk+A9YhxH09wTsWrUjRDWUgrejzP:jylEZw6cagEaA2+DRk+Aahd4erenP
Malware Config
Signatures
Files
-
7d7007db1a1d1d0733c2f3948f42513ceeaf3d706f0ce36ac8466d605419d9c7.dll windows x86
d234aa10771a78db89acee7306654b74
Code Sign
7d:87:fd:d2:76:85:1d:6b:b9:3e:35:ea:72:5b:98:6aCertificate
IssuerCN=Root AgencyNot Before16/09/2009, 07:50Not After31/12/2039, 23:59SubjectCN=Microsoft(R) Windows Media Player,O=Microsoft(R) Windows Media PlayerSigner
Actual PE DigestDigest AlgorithmPE Digest MatchesfalseHeaders
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapDestroy
DeleteCriticalSection
FlushInstructionCache
GetCurrentProcess
GetTickCount
lstrlenA
Sleep
GetProcAddress
LoadLibraryA
GetModuleFileNameA
InitializeCriticalSection
InterlockedIncrement
DebugBreak
OutputDebugStringA
lstrcpynA
lstrcpynW
OpenProcess
CloseHandle
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
DisableThreadLibraryCalls
InterlockedDecrement
GetVersionExA
user32
GetMenuItemInfoA
GetMenuItemCount
CreatePopupMenu
TrackPopupMenuEx
IsWindow
MapWindowPoints
PtInRect
RemoveMenu
InvalidateRect
GetMonitorInfoA
MonitorFromPoint
PostQuitMessage
CharNextA
wvsprintfA
CallWindowProcA
GetWindowLongA
DefWindowProcA
ShowWindow
FindWindowA
LoadAcceleratorsA
AppendMenuA
DestroyMenu
GetTopWindow
GetClassNameA
GetParent
GetWindow
SendMessageA
GetWindowTextA
GetCursorPos
GetWindowRect
SetCursorPos
mouse_event
KillTimer
PostMessageA
GetLastInputInfo
SetTimer
TranslateAcceleratorA
GetClassInfoExA
LoadCursorA
wsprintfA
LoadImageA
RegisterClassExA
SetWindowLongA
DestroyWindow
CreateWindowExA
PeekMessageA
GetMessageA
TranslateMessage
MessageBeep
GetClientRect
SetFocus
LoadStringW
DispatchMessageA
LoadStringA
LoadMenuA
SetWindowPos
advapi32
RegCloseKey
RegOpenKeyA
RegSetValueExA
RegCreateKeyExA
RegQueryValueExA
ole32
OleUninitialize
OleInitialize
msvcrt
memset
atoi
isdigit
wcslen
strstr
strrchr
strcmp
time
_initterm
memmove
realloc
??3@YAXPAX@Z
memcpy
??2@YAPAXI@Z
free
__CxxFrameHandler
strcpy
strlen
_except_handler3
malloc
_adjust_fdiv
_purecall
_strcmpi
psapi
EnumProcesses
EnumProcessModules
GetModuleBaseNameA
msvcp60
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
Exports
Exports
CetxEml
DllRundll
aetxEml
awcweljkdafasdf
betxEml
setxml
Sections
.text Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 700B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ