Static task
static1
Behavioral task
behavioral1
Sample
00188df4886d9185d8f132ed3f386d0f49b1eada3bc1bab806f45636629545a0.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
00188df4886d9185d8f132ed3f386d0f49b1eada3bc1bab806f45636629545a0.dll
Resource
win10v2004-20221111-en
General
-
Target
00188df4886d9185d8f132ed3f386d0f49b1eada3bc1bab806f45636629545a0
-
Size
218KB
-
MD5
f56d4723bc84e459f8f1baeb3083ea8c
-
SHA1
7ac3c12e66cdea4a79fcb6eb6e70607a9e2745f1
-
SHA256
00188df4886d9185d8f132ed3f386d0f49b1eada3bc1bab806f45636629545a0
-
SHA512
2ff3b79c94ba303e290390a481e47bd09736d708fbc8198094266d824f38d226931ceee058bf81f0476ef6f39fe8c52613315f54961202be2a37511ff0812117
-
SSDEEP
6144:JQjZEQQTmbOuhsV4u4mCxaLl9Q1SlDhYpf:6yQCP9H2xKle1Sla9
Malware Config
Signatures
Files
-
00188df4886d9185d8f132ed3f386d0f49b1eada3bc1bab806f45636629545a0.dll windows x86
56a551a456a37b5695cab534848e0498
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateThread
GetModuleHandleA
ExitProcess
VirtualProtect
LoadLibraryA
VirtualProtectEx
VirtualAlloc
ReadProcessMemory
Sleep
GetCurrentProcess
MulDiv
HeapFree
GetProcessHeap
HeapAlloc
OutputDebugStringA
IsProcessorFeaturePresent
GetSystemInfo
VirtualFree
GetProcAddress
EncodePointer
DecodePointer
InterlockedExchange
InterlockedCompareExchange
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetVersionExA
MultiByteToWideChar
WideCharToMultiByte
VirtualProtect
ExitProcess
user32
GetDesktopWindow
DefWindowProcA
CreateWindowExA
RegisterClassExA
DestroyWindow
GetAsyncKeyState
gdi32
GetCharacterPlacementA
GetCharacterPlacementW
SetBkMode
GetTextExtentPoint32A
GetGlyphOutlineA
DeleteDC
CreateDIBSection
CreateFontA
GetDeviceCaps
SetBkColor
DeleteObject
GetTextMetricsA
GetObjectW
SetTextColor
CreateFontIndirectA
ExtTextOutW
MoveToEx
CreateFontIndirectW
GetObjectA
GetFontLanguageInfo
GetTextMetricsW
ExtTextOutA
SetTextAlign
SetMapMode
CreateCompatibleDC
SelectObject
shell32
ShellExecuteA
msvcr100
_CIacos
_except_handler4_common
_onexit
_lock
__dllonexit
_unlock
__clean_type_info_names_internal
_crt_debugger_hook
__CppXcptFilter
_amsg_exit
_initterm_e
_initterm
_encoded_null
_malloc_crt
??3@YAXPAX@Z
system
malloc
memmove
sprintf
??2@YAPAXI@Z
free
ceil
_mbsnbcpy
tmpfile
fclose
fwrite
fseek
fread
_CIpow
_ftol
strncpy
memset
_finite
iswpunct
iswdigit
iswalpha
iswspace
modf
__CxxFrameHandler
longjmp
_setjmp3
isdigit
isspace
sscanf
ldexp
_strdup
setlocale
floor
exit
d3d9
Direct3DCreate9
wininet
InternetOpenA
InternetOpenUrlA
InternetReadFile
advapi32
RegCloseKey
RegOpenKeyA
RegQueryValueExA
Sections
.text Size: - Virtual size: 290KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data0 Size: - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data1 Size: - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.data2 Size: 216KB - Virtual size: 215KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 104B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ