?TLS@@YGXK@Z
Static task
static1
Behavioral task
behavioral1
Sample
491d9f2db5d00ec8710da328479ca5d7a86728f459912e567db9cd89477dc8db.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
491d9f2db5d00ec8710da328479ca5d7a86728f459912e567db9cd89477dc8db.dll
Resource
win10v2004-20220812-en
General
-
Target
491d9f2db5d00ec8710da328479ca5d7a86728f459912e567db9cd89477dc8db
-
Size
146KB
-
MD5
dd4ba2b8b58969badc3c1f8975229fc0
-
SHA1
a08034340beea4d7b044f16e5c588165d0b03366
-
SHA256
491d9f2db5d00ec8710da328479ca5d7a86728f459912e567db9cd89477dc8db
-
SHA512
106b4c85c8ce473d2f9847efed9ae2b8ebbe404dd6f5c470156626f1909e0f7b3c139d81784ca56d54d469f7db33123f311dd4a9d164694fa38a9d1220d1d1e0
-
SSDEEP
3072:zKlB3q5v3UX5G677xJkmE0El0U3d4rqo5k3+QPgNa4hHn0F3:+lB3IvIg6RJkV0cNQqnPGJM
Malware Config
Signatures
Files
-
491d9f2db5d00ec8710da328479ca5d7a86728f459912e567db9cd89477dc8db.dll windows x86
a3b190e7a802c5c12028ccc9b118a211
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathIsPrefixA
kernel32
GetSystemDefaultUILanguage
WaitForSingleObjectEx
TlsGetValue
SetThreadContext
GlobalReAlloc
SetPriorityClass
WinExec
GetCurrentThread
DeleteFileW
RemoveDirectoryW
FlushFileBuffers
SetSystemTime
GetFileAttributesA
GetCurrentDirectoryW
HeapUnlock
GetSystemTime
FindResourceExA
GlobalLock
LoadLibraryA
GetModuleFileNameW
DeleteAtom
MulDiv
TransactNamedPipe
CancelIo
ConnectNamedPipe
GetOEMCP
GetLongPathNameW
SetLocalTime
GetSystemDirectoryA
GetNumberFormatW
SetupComm
VirtualFree
ConvertDefaultLocale
RemoveDirectoryA
GlobalMemoryStatus
FindFirstChangeNotificationW
VirtualProtect
MoveFileExW
GetWindowsDirectoryA
GetTempFileNameA
lstrcatA
GetComputerNameExA
ResumeThread
SetCommTimeouts
FreeResource
GlobalAddAtomA
GetModuleFileNameA
GetTempPathA
GetFileAttributesExA
FoldStringW
CreateFileMappingA
InitializeCriticalSection
GetCommProperties
CopyFileW
QueryDosDeviceW
GetUserDefaultLCID
GlobalHandle
GetThreadPriority
IsBadCodePtr
SetCommState
SetCommMask
GetOverlappedResult
GetThreadTimes
lstrcatW
EscapeCommFunction
CreateFileA
VerifyVersionInfoW
MoveFileA
GetShortPathNameW
SearchPathW
AddAtomA
GetCommandLineW
CreateEventA
SetHandleInformation
CreateEventW
ReadFile
GetCommTimeouts
EnumResourceNamesW
IsBadReadPtr
CreateMutexW
QueryPerformanceCounter
FindCloseChangeNotification
GetSystemWindowsDirectoryA
GetStartupInfoW
lstrcpynA
GetCommState
GetComputerNameExW
CreateWaitableTimerA
GetPriorityClass
lstrlenW
CreateThread
SetNamedPipeHandleState
HeapSize
GlobalFlags
CompareFileTime
SystemTimeToFileTime
OpenSemaphoreW
SetFileTime
CreateSemaphoreW
TryEnterCriticalSection
IsValidLocale
OpenFile
DefineDosDeviceW
user32
GetClientRect
GetForegroundWindow
Exports
Exports
Sections
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text Size: 50KB - Virtual size: 50KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 967B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 558B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ