Static task
static1
Behavioral task
behavioral1
Sample
76ec2a946580853bbab1e3c3402d57e3fccc78c78c431b1b3e6d42c86922e98d.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
76ec2a946580853bbab1e3c3402d57e3fccc78c78c431b1b3e6d42c86922e98d.dll
Resource
win10v2004-20220812-en
General
-
Target
76ec2a946580853bbab1e3c3402d57e3fccc78c78c431b1b3e6d42c86922e98d
-
Size
87KB
-
MD5
080f90f92db46fdfac517947a96a2cea
-
SHA1
276b07002613da54b814fc2bd2551997a435ae16
-
SHA256
76ec2a946580853bbab1e3c3402d57e3fccc78c78c431b1b3e6d42c86922e98d
-
SHA512
c0799f7ea07c80ce7df4921e26afefec1f4d833966ed67bf7911129ae03fd3fb3a437e19f7f62c8f3b468c747724615497a767c9d0ed503e5d5826896a51e0a8
-
SSDEEP
1536:5SQYNA8WpKFIIean6Our7wBwGib6X/hXYvqfizbfHRIrZ2IPLY:5tQxKCn6Oursib6v2vqf4zRMZ280
Malware Config
Signatures
Files
-
76ec2a946580853bbab1e3c3402d57e3fccc78c78c431b1b3e6d42c86922e98d.dll windows x86
25724e12bddf5d83058b26b5e04ea860
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
ShowScrollBar
SetMenuInfo
OemToCharW
MessageBeep
LoadImageA
LoadCursorA
LoadAcceleratorsW
GetMenu
GetFocus
GetDlgItem
EndDeferWindowPos
DrawCaption
CreateDesktopW
CreateAcceleratorTableA
CopyImage
CharUpperBuffA
CharUpperA
ChangeMenuA
kernel32
GetModuleHandleA
LocalAlloc
LoadLibraryA
LeaveCriticalSection
GetSystemTimeAsFileTime
GetLocalTime
GetFileSize
lstrcpynA
lstrcmpiA
VirtualFree
TlsGetValue
TlsFree
TlsAlloc
SleepEx
SetEndOfFile
RtlUnwind
RaiseException
OpenFileMappingA
EnumResourceLanguagesA
FreeResource
GetDateFormatA
MapViewOfFile
oleaut32
OleLoadPicturePath
SafeArrayDestroy
SysReAllocString
VarBstrCat
OleIconToCursor
ClearCustData
Sections
.text Size: 17KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 65KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ