Static task
static1
Behavioral task
behavioral1
Sample
d3649417d8d494af1e33b51e2546136f60a52b0e5f6c57718abc921cec8254d8.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d3649417d8d494af1e33b51e2546136f60a52b0e5f6c57718abc921cec8254d8.dll
Resource
win10v2004-20221111-en
General
-
Target
d3649417d8d494af1e33b51e2546136f60a52b0e5f6c57718abc921cec8254d8
-
Size
40KB
-
MD5
8787bf5d25ec0004c991b77e78eadce7
-
SHA1
b0c1925199e628cbef021b917324ae5912a1f534
-
SHA256
d3649417d8d494af1e33b51e2546136f60a52b0e5f6c57718abc921cec8254d8
-
SHA512
1dced04da4a0f5757515c136646ee9dc4ac1d83aad773eedfba3105a9df807a0bd0108eabb1a2a05a601e44d293ce057c460f1236c695bd4a2fc6dc833de9083
-
SSDEEP
768:zf1tr0sOsvOfGzgK1VV+1/JOR6se4BrZ:zFWfMbv8/JhsLZ
Malware Config
Signatures
Files
-
d3649417d8d494af1e33b51e2546136f60a52b0e5f6c57718abc921cec8254d8.dll windows x86
9884ba315d910337ed6434f00c2326e8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
wcsncmp
free
_endthreadex
calloc
realloc
??2@YAPAXI@Z
_purecall
memmove
_errno
??3@YAXPAX@Z
_initterm
wcschr
_ltow
??_U@YAPAXI@Z
_wcsrev
wcsstr
??_V@YAXPAX@Z
_beginthreadex
memset
swprintf
memcpy
shlwapi
SHEnumKeyExW
SHSetValueW
SHGetValueW
PathRemoveFileSpecW
PathFindFileNameW
ws2_32
WSAStartup
atl
ord40
wininet
FindNextUrlCacheEntryW
DeleteUrlCacheEntryW
UnlockUrlCacheEntryFileW
FindFirstUrlCacheEntryW
FindCloseUrlCache
ntdll
RtlRandom
kernel32
GetTickCount
WaitForSingleObject
QueueUserAPC
SetEvent
SleepEx
LeaveCriticalSection
EnterCriticalSection
SetPriorityClass
SetProcessAffinityMask
SetUnhandledExceptionFilter
MultiByteToWideChar
WriteFile
ReadFile
GetFileSize
InitializeCriticalSectionAndSpinCount
CreateEventW
GetCommandLineW
LocalFree
SetFilePointer
GetLastError
GetProcessAffinityMask
Sleep
FlushInstructionCache
LoadLibraryW
UnmapViewOfFile
VirtualAlloc
GetProcAddress
MapViewOfFile
CreateFileMappingW
CreateFileW
RaiseException
GetCurrentThreadId
OpenThread
TerminateThread
CloseHandle
GetCurrentProcessId
ExpandEnvironmentStringsW
GetModuleFileNameW
user32
ChildWindowFromPointEx
GetAncestor
SendMessageW
RegisterClassW
UnregisterClassW
CreateWindowExW
PostMessageW
GetMessageW
TranslateMessage
DispatchMessageW
SetWindowLongW
DestroyWindow
PostQuitMessage
GetParent
GetWindowLongW
FindWindowW
SetTimer
KillTimer
ShowWindow
SendMessageTimeoutW
CharLowerBuffW
GetClientRect
CharUpperBuffW
GetClassNameW
DefWindowProcW
ClientToScreen
ScreenToClient
advapi32
SetSecurityInfo
GetSecurityDescriptorSacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
shell32
ShellExecuteExW
ole32
OleUninitialize
OleInitialize
StringFromCLSID
ProgIDFromCLSID
CoTaskMemFree
oleaut32
SafeArrayCreate
SafeArrayCopy
SafeArrayGetVartype
SafeArrayGetUBound
SafeArrayGetLBound
VarBstrCmp
VariantClear
SysAllocStringLen
SysStringLen
SysStringByteLen
SysAllocStringByteLen
SysFreeString
SysAllocString
SafeArrayUnlock
SafeArrayLock
DispGetIDsOfNames
DispInvoke
CreateDispTypeInfo
VarBstrCat
SafeArrayDestroy
Sections
.text Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ