dnfgjx
Static task
static1
Behavioral task
behavioral1
Sample
2e2052a8ed70e846f9cc145af332ca992d106ad0e27bebb84583877b574032d2.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2e2052a8ed70e846f9cc145af332ca992d106ad0e27bebb84583877b574032d2.dll
Resource
win10v2004-20220901-en
General
-
Target
2e2052a8ed70e846f9cc145af332ca992d106ad0e27bebb84583877b574032d2
-
Size
138KB
-
MD5
2ce3e96eb6cfc6ece52963c22a105964
-
SHA1
20c6621be5fbe60dc42d4fab4ad787b7ea36806d
-
SHA256
2e2052a8ed70e846f9cc145af332ca992d106ad0e27bebb84583877b574032d2
-
SHA512
ff49072562b3ec414460a5f5c41bf7aa18863f79a3914f18462d2c7190f55f845d2c9b3eb3e7bf232cda02c4bbffcf4b92d87a0c0e8f8e1937e4948aa387c8fe
-
SSDEEP
1536:RBD/aHbtVbM2/zBxNopSz6N7wng6UtPB6nlayTinyE0EPAxu3FmK9Nz:jzaHbt5M2ypN8g6aea4hE0EPAxu3Fb
Malware Config
Signatures
Files
-
2e2052a8ed70e846f9cc145af332ca992d106ad0e27bebb84583877b574032d2.dll windows x86
dbe3d25a052c3cedfea446c31ba44c42
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyExA
RegEnumValueA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
comctl32
ImageList_Add
ImageList_AddMasked
ImageList_Create
ImageList_Destroy
ImageList_Draw
ImageList_DrawEx
ImageList_GetIcon
ImageList_GetIconSize
ImageList_GetImageCount
ImageList_GetImageInfo
ImageList_LoadImageA
ImageList_Remove
ImageList_Replace
ImageList_ReplaceIcon
ImageList_SetImageCount
InitCommonControlsEx
comdlg32
GetOpenFileNameA
GetSaveFileNameA
gdi32
AngleArc
Arc
ArcTo
BitBlt
Chord
CreateBrushIndirect
CreateFontA
CreatePen
CreateSolidBrush
DeleteObject
Ellipse
ExtFloodFill
GetDeviceCaps
GetPixel
GetTextExtentPoint32A
LineTo
MoveToEx
Pie
PolyBezier
PolyBezierTo
Polygon
Polyline
PolylineTo
Rectangle
RoundRect
SelectObject
SetBkColor
SetBkMode
SetPixel
SetROP2
SetTextColor
StretchBlt
TextOutA
kernel32
AddAtomA
CloseHandle
CreateFileA
CreateMutexA
CreateProcessA
CreateSemaphoreA
CreateThread
DeleteCriticalSection
DeleteFileA
EnterCriticalSection
FindAtomA
FindFirstFileA
FlushFileBuffers
FlushInstructionCache
GetAtomNameA
GetCurrentDirectoryA
GetCurrentProcess
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetPrivateProfileIntA
GetPrivateProfileStringA
GetProcAddress
GetSystemDirectoryA
GetSystemWow64DirectoryA
GetTempPathA
GetWindowsDirectoryA
GlobalAlloc
GlobalFree
GlobalReAlloc
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
LCMapStringA
LeaveCriticalSection
LoadLibraryA
LockFile
MoveFileA
MulDiv
MultiByteToWideChar
ReadFile
ReleaseSemaphore
SetCurrentDirectoryA
SetEndOfFile
SetFilePointer
SetLastError
Sleep
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnlockFile
VirtualProtect
WaitForSingleObject
WideCharToMultiByte
WriteFile
WritePrivateProfileStringA
lstrlenA
msvcrt
_strnicmp
__dllonexit
_assert
_controlfp
_errno
_iob
_itoa
_ultoa
abort
abs
atof
atoi
atol
calloc
exit
fclose
fflush
fopen
fprintf
free
fwrite
malloc
memcpy
memset
realloc
sprintf
strcat
strcmp
strcpy
strlen
strncpy
strstr
wcslen
user32
AppendMenuA
BeginPaint
CallWindowProcA
CheckMenuItem
CheckMenuRadioItem
CheckRadioButton
CloseWindow
CreateDialogParamA
CreateMenu
CreatePopupMenu
CreateWindowExA
DefWindowProcA
DeleteMenu
DestroyMenu
DestroyWindow
DialogBoxParamA
DispatchMessageA
DrawFocusRect
EnableMenuItem
EnableScrollBar
EnableWindow
EndDialog
EndPaint
FillRect
FindWindowExA
GetClassInfoA
GetClassNameA
GetClientRect
GetCursorPos
GetDC
GetDCEx
GetDesktopWindow
GetDlgCtrlID
GetDlgItem
GetFocus
GetForegroundWindow
GetKeyNameTextA
GetMenu
GetMenuContextHelpId
GetMenuDefaultItem
GetMenuInfo
GetMenuItemCount
GetMenuItemID
GetMenuItemInfoA
GetMenuState
GetMenuStringA
GetMessageA
GetParent
GetPropA
GetScrollInfo
GetScrollPos
GetScrollRange
GetSubMenu
GetSysColor
GetSysColorBrush
GetSystemMetrics
GetWindowLongA
GetWindowRect
GetWindowTextA
GetWindowTextLengthA
InsertMenuA
InsertMenuItemA
InvalidateRect
IsChild
IsDialogMessageA
IsMenu
IsWindow
IsWindowEnabled
IsWindowVisible
IsZoomed
KillTimer
LoadCursorA
LoadIconA
LoadMenuA
LoadMenuIndirectA
MapVirtualKeyA
MapWindowPoints
MessageBoxA
ModifyMenuA
MoveWindow
PeekMessageA
PostMessageA
PostQuitMessage
RegisterClassA
ReleaseDC
RemoveMenu
ScreenToClient
SendMessageA
SetFocus
SetMenu
SetMenuContextHelpId
SetMenuDefaultItem
SetMenuInfo
SetMenuItemBitmaps
SetMenuItemInfoA
SetParent
SetPropA
SetScrollInfo
SetScrollPos
SetScrollRange
SetTimer
SetWindowLongA
SetWindowPos
SetWindowTextA
ShowScrollBar
ShowWindow
TrackPopupMenu
TrackPopupMenuEx
TranslateMessage
UpdateWindow
wininet
HttpQueryInfoA
InternetCloseHandle
InternetOpenA
InternetOpenUrlA
InternetReadFile
Exports
Exports
Sections
.text Size: 121KB - Virtual size: 121KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 1020B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 40KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 512B - Virtual size: 68B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ