?TLS@@YGXK@Z
Static task
static1
Behavioral task
behavioral1
Sample
1c21be8951a7577d5832156a28b7e912ef60268317fb4ae2319286de3fac6678.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1c21be8951a7577d5832156a28b7e912ef60268317fb4ae2319286de3fac6678.dll
Resource
win10v2004-20221111-en
General
-
Target
1c21be8951a7577d5832156a28b7e912ef60268317fb4ae2319286de3fac6678
-
Size
145KB
-
MD5
8457e1a4691f8f1b324b629e7fb13f60
-
SHA1
3b82a7117b6de6f71d998826c5233a10503a9437
-
SHA256
1c21be8951a7577d5832156a28b7e912ef60268317fb4ae2319286de3fac6678
-
SHA512
38d3a8a8a0ab7875e57d3a832482e589c46c78242fc2d6a9ad013007c52adbf97da9aa2fe847cf16079dd4c414c7445e8b90bc27a66cd6c1adf36f5b2d8b5e06
-
SSDEEP
3072:l16dRFvZTJvcbiy93Xrok55R8bj5lYy2d8+elIQuOpjeCyE/tvxg+jqpN4lCp29:7qRNRJWt93b55RKjzYV8+elIQwChRF
Malware Config
Signatures
Files
-
1c21be8951a7577d5832156a28b7e912ef60268317fb4ae2319286de3fac6678.dll windows x86
5d12a534d0330fcec1c28af4fe712cce
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetKeyState
GetForegroundWindow
shlwapi
PathIsPrefixA
kernel32
GetTempPathA
GlobalReAlloc
SetNamedPipeHandleState
GetUserDefaultLCID
GetWindowsDirectoryA
IsBadReadPtr
lstrlenW
OpenFile
SetPriorityClass
FreeResource
HeapReAlloc
WaitForSingleObjectEx
InitializeCriticalSection
CreateMutexW
GetShortPathNameW
SetCommMask
SetCommTimeouts
GetCurrentThreadId
GetCommState
GetFileAttributesA
FileTimeToLocalFileTime
FoldStringW
GetModuleFileNameA
IsBadCodePtr
GetCommConfig
CreateThread
SetCommState
EscapeCommFunction
GetComputerNameExW
VirtualFree
PulseEvent
WaitForSingleObject
QueryDosDeviceW
TlsGetValue
SetHandleInformation
TransactNamedPipe
SearchPathW
CreateFileMappingA
IsValidLocale
CompareFileTime
SetLastError
GetUserDefaultLangID
GetModuleFileNameW
lstrcatW
DefineDosDeviceW
GetOverlappedResult
QueryPerformanceCounter
MoveFileA
SetupComm
FindClose
ResumeThread
CreateFileA
GlobalLock
GetSystemDirectoryW
GetSystemDirectoryA
GetHandleInformation
OpenSemaphoreW
GetSystemTime
GetTempFileNameA
FindFirstChangeNotificationW
CreateEventA
DeleteFileW
SetThreadContext
FlushFileBuffers
GetOEMCP
HeapSize
GetThreadTimes
CancelIo
MulDiv
lstrcmpA
CreateEventW
SetSystemTime
GetStartupInfoW
lstrcatA
GlobalAddAtomA
RemoveDirectoryA
GetNumberFormatW
WinExec
TryEnterCriticalSection
CopyFileW
lstrcpynA
LoadLibraryA
HeapCreate
FindResourceA
DeleteAtom
AddAtomA
RtlUnwind
RemoveDirectoryW
SystemTimeToFileTime
GetFileAttributesExA
GetCommProperties
GetEnvironmentStringsW
HeapUnlock
FindCloseChangeNotification
SetFileTime
GetPriorityClass
GetCurrentDirectoryW
EnumResourceNamesW
GetCommandLineW
GetLongPathNameW
VirtualProtect
MoveFileExW
Exports
Exports
Sections
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text Size: 50KB - Virtual size: 50KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 892B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 990B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ