?ThreadA@@YGXK@Z
Static task
static1
Behavioral task
behavioral1
Sample
7c533514d1a4d81bd48683d942c7891953b5e40a00e89e13f910134fbb17ab8f.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7c533514d1a4d81bd48683d942c7891953b5e40a00e89e13f910134fbb17ab8f.dll
Resource
win10v2004-20220812-en
General
-
Target
7c533514d1a4d81bd48683d942c7891953b5e40a00e89e13f910134fbb17ab8f
-
Size
149KB
-
MD5
15296ba74107a489db8ff4dcf7210f70
-
SHA1
3924521d8693c486b72828564a6ab89019c7f582
-
SHA256
7c533514d1a4d81bd48683d942c7891953b5e40a00e89e13f910134fbb17ab8f
-
SHA512
cc923eee04ddb9feb6fb5fd589cfdca7686d3074fbe055aefe4ecfe5a8372a9cb60ac5171b9db35582c4dfe18a42174a16f3a4a8736fd0e9ff7b609df3806409
-
SSDEEP
3072:PdVfEV2OxhSqcsHoHuj/V9wPz2wF7EntOcjpmjKsJT4EXJFfYKJq1:PdVCxh9RHquAg5yT4EXrHU
Malware Config
Signatures
Files
-
7c533514d1a4d81bd48683d942c7891953b5e40a00e89e13f910134fbb17ab8f.dll windows x86
6245c3ede1600dcabe3d6e1f06451a09
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetDesktopWindow
kernel32
FindNextFileA
FoldStringW
CopyFileA
lstrcmpiA
ReleaseMutex
MoveFileExW
WideCharToMultiByte
HeapSize
GetVersionExW
CreateDirectoryA
GlobalAddAtomA
IsDBCSLeadByte
UnmapViewOfFile
GetDateFormatW
SetMailslotInfo
IsValidLocale
GetStringTypeExW
GetTimeZoneInformation
CompareStringW
InitializeCriticalSection
DeleteFileW
GetAtomNameA
IsValidLanguageGroup
GetThreadContext
CallNamedPipeW
GetStartupInfoA
GlobalGetAtomNameW
GetCompressedFileSizeW
ClearCommError
FormatMessageW
SetLastError
GetCommState
SetFilePointer
FreeLibrary
CreateFileA
CompareFileTime
SetCurrentDirectoryA
lstrcatW
lstrcmpiW
FileTimeToLocalFileTime
FormatMessageA
GetPriorityClass
ConnectNamedPipe
GetSystemTimeAdjustment
SetCommBreak
GetWindowsDirectoryA
CreatePipe
QueryPerformanceCounter
TerminateThread
GetStdHandle
EscapeCommFunction
TlsFree
GetThreadLocale
lstrcpynA
VerSetConditionMask
GetComputerNameExW
TransactNamedPipe
GlobalReAlloc
GetCommConfig
TlsGetValue
HeapAlloc
GetCommProperties
AddAtomW
GetCommandLineA
FileTimeToSystemTime
AreFileApisANSI
GetStartupInfoW
FindNextChangeNotification
GetProcAddress
SetThreadContext
TryEnterCriticalSection
SearchPathA
GetModuleFileNameA
DeviceIoControl
GetBinaryTypeA
FindFirstChangeNotificationW
FlushFileBuffers
RtlUnwind
GetCurrentThread
WinExec
RaiseException
OpenEventW
GetUserDefaultLCID
GlobalMemoryStatusEx
lstrcpynW
SetTimerQueueTimer
OpenFile
IsBadStringPtrW
LoadLibraryExA
MultiByteToWideChar
DeleteCriticalSection
MoveFileA
VirtualFree
LoadLibraryW
GetFileType
GlobalDeleteAtom
IsBadReadPtr
CreateNamedPipeW
CreateMutexW
SetNamedPipeHandleState
GetCPInfo
GlobalFree
SetCommTimeouts
LCMapStringW
SetUnhandledExceptionFilter
lstrcmpW
GetComputerNameExA
MoveFileW
GetThreadPriority
FindResourceA
SetFileTime
LoadLibraryExW
GetModuleFileNameW
EnumResourceNamesA
GetBinaryTypeW
GetFileAttributesExW
CreateRemoteThread
SetWaitableTimer
GetTimeFormatA
GetLocaleInfoA
MoveFileExA
SizeofResource
GetCommandLineW
GetLastError
CreateThread
GlobalFlags
GetTimeFormatW
SetCommMask
VirtualProtect
GetCurrentThreadId
SetHandleInformation
GetAtomNameW
CancelWaitableTimer
WaitForMultipleObjects
EnumResourceTypesA
HeapUnlock
LocalReAlloc
GetVersionExA
lstrlenW
GetSystemInfo
SetPriorityClass
SetErrorMode
ReleaseSemaphore
ClearCommBreak
lstrcpyW
PulseEvent
DeleteFileA
ReadFile
GetComputerNameW
GetUserDefaultLangID
GlobalAlloc
AddAtomA
HeapLock
SetCommState
HeapCreate
GlobalMemoryStatus
MapViewOfFile
WaitForMultipleObjectsEx
SuspendThread
SetHandleCount
IsDBCSLeadByteEx
SetThreadExecutionState
CreateWaitableTimerW
ConvertDefaultLocale
EnterCriticalSection
CreateWaitableTimerA
WriteFile
GetExitCodeThread
SetFileAttributesW
ExitThread
FindClose
GetNumberFormatA
GlobalFindAtomW
UnhandledExceptionFilter
GetFileSize
FreeResource
lstrcatA
GetModuleHandleW
LoadResource
CreateSemaphoreA
SetupComm
SetFileAttributesA
GetTempPathW
HeapWalk
GetCommTimeouts
OpenSemaphoreW
MulDiv
GetModuleHandleA
GetSystemTime
FlushViewOfFile
FindResourceExW
LCMapStringA
SetThreadLocale
GetSystemDirectoryA
LocalSize
GetSystemWindowsDirectoryA
VerifyVersionInfoW
OpenFileMappingW
LockFile
GetFileAttributesW
QueryDosDeviceW
GlobalHandle
SetLocalTime
CreateEventA
CreateSemaphoreW
FindNextFileW
GetDateFormatA
GlobalCompact
EnumResourceNamesW
LeaveCriticalSection
GetTempPathA
FindResourceW
TlsSetValue
LocalLock
GetShortPathNameW
GetTempFileNameA
GetCommModemStatus
CloseHandle
IsBadWritePtr
lstrlenA
Exports
Exports
Sections
.text Size: 50KB - Virtual size: 49KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.akpp Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.brafo Size: 1024B - Virtual size: 581B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.espt Size: 512B - Virtual size: 28B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ls0 Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.sorp Size: 512B - Virtual size: 64B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.clost Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.meosi Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.mfo Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.porte Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ