install
Static task
static1
Behavioral task
behavioral1
Sample
c34819d6461c1bf24a55c844de9323f0b4fa327f8bd982a72d9be52dbc6cb185.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c34819d6461c1bf24a55c844de9323f0b4fa327f8bd982a72d9be52dbc6cb185.dll
Resource
win10v2004-20220901-en
General
-
Target
c34819d6461c1bf24a55c844de9323f0b4fa327f8bd982a72d9be52dbc6cb185
-
Size
48KB
-
MD5
62ba9a270d5a4386ed9ccb11b61a75f0
-
SHA1
e0bda4c8df5a552f62d04a5db5bea6bc069e02a5
-
SHA256
c34819d6461c1bf24a55c844de9323f0b4fa327f8bd982a72d9be52dbc6cb185
-
SHA512
0b2aa9d6a4b9daf8512f4a76f7bf8dae3a78a6f4b5a89a2b742b5f48aeff00c410f20239e8c2b9a74f9e28404c1f72391fe1ddb492a16da4a5cf0f50bba61c86
-
SSDEEP
1536:eGNiQyrmyYvhL0lTxY7+tnlCpaYwaBjHVeU+ls:eEiQTylCpO8VeU+ls
Malware Config
Signatures
Files
-
c34819d6461c1bf24a55c844de9323f0b4fa327f8bd982a72d9be52dbc6cb185.dll windows x86
0efb31e83842bdb02180e5e364869b8a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileAttributesExA
GetProcAddress
GetModuleHandleA
GetStartupInfoA
DeleteFileA
InterlockedDecrement
InterlockedIncrement
GetEnvironmentVariableA
GlobalMemoryStatus
GetVersionExA
TerminateProcess
WriteFile
ReadFile
Sleep
WaitForSingleObject
CloseHandle
GetWindowsDirectoryA
GetTickCount
LoadLibraryA
Process32Next
Process32First
CreateToolhelp32Snapshot
CreateThread
lstrcatA
SetEnvironmentVariableA
CompareStringW
CompareStringA
FindFirstFileA
lstrlenA
lstrcmpA
FindNextFileA
FindClose
GetDriveTypeA
GetVolumeInformationA
lstrcpyA
SetEndOfFile
GetOEMCP
GetACP
LCMapStringW
LCMapStringA
GetCPInfo
CreateFileA
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
LocalFree
GetDiskFreeSpaceExA
RtlUnwind
HeapFree
HeapAlloc
GetLastError
GetFileAttributesA
GetTimeZoneInformation
GetSystemTime
GetLocalTime
GetCommandLineA
GetVersion
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
HeapDestroy
HeapCreate
VirtualFree
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ExitProcess
VirtualAlloc
HeapReAlloc
IsBadWritePtr
FlushFileBuffers
SetStdHandle
GetFileType
SetFilePointer
SetHandleCount
GetStdHandle
GetCurrentProcess
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
RaiseException
user32
DispatchMessageA
TranslateMessage
GetMessageA
wsprintfA
advapi32
RegOpenKeyExA
CredEnumerateA
CredFree
GetUserNameW
RegEnumKeyExA
RegQueryValueExA
RegCloseKey
ws2_32
send
__WSAFDIsSet
htons
connect
closesocket
select
gethostname
socket
shutdown
WSAIoctl
setsockopt
WSACleanup
gethostbyname
WSAStartup
recv
netapi32
NetUserGetInfo
NetApiBufferFree
crypt32
CryptUnprotectData
oleaut32
GetErrorInfo
Exports
Exports
Sections
.text Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 872B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ