Static task
static1
Behavioral task
behavioral1
Sample
af3e12ea962126ba47736e217caa13f8af76bfcb05e66f29b9ce571300a4a456.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
af3e12ea962126ba47736e217caa13f8af76bfcb05e66f29b9ce571300a4a456.dll
Resource
win10v2004-20221111-en
General
-
Target
af3e12ea962126ba47736e217caa13f8af76bfcb05e66f29b9ce571300a4a456
-
Size
838KB
-
MD5
fcc9edcbe96649336509aec98a054ac0
-
SHA1
fd19b7264b0d3e6e1da7c8ecdde6f49843447f0f
-
SHA256
af3e12ea962126ba47736e217caa13f8af76bfcb05e66f29b9ce571300a4a456
-
SHA512
4d1a2cb560004c69d6ee246080e20ed637bb6f82fb1a801d66bd71b8876a637f80842313927bb0ef523aaeae392b38bff68f82853ee9cd9322cef9ff1c023467
-
SSDEEP
12288:siBT/Vms1QXvjdmzKbZjZFo5k8Z9r9xZL6l19Rl969oo/ZwZdECtmsMH1vR:siRCfjc2FTP8lu95bo/GzECzgR
Malware Config
Signatures
Files
-
af3e12ea962126ba47736e217caa13f8af76bfcb05e66f29b9ce571300a4a456.dll windows x86
a483770f8556dbf03afcb0dc25e1a214
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileType
SetHandleCount
SetEnvironmentVariableA
GetLastError
VirtualAlloc
GetWindowsDirectoryA
LockFile
SetFilePointer
UnlockFile
FileTimeToLocalFileTime
GlobalLock
FlushFileBuffers
IsDebuggerPresent
GetStartupInfoA
HeapCreate
WriteConsoleA
GetConsoleOutputCP
TlsSetValue
GlobalDeleteAtom
ConvertDefaultLocale
InterlockedDecrement
TlsAlloc
GlobalHandle
GetCommandLineW
TlsGetValue
GetCurrentThread
GetStringTypeA
GetLocaleInfoA
InterlockedExchange
VirtualFree
lstrcmpA
LocalFree
ReadFile
SizeofResource
GlobalFlags
UnhandledExceptionFilter
GetCurrentProcessId
LoadResource
FindClose
SetEndOfFile
LocalFileTimeToFileTime
WriteFile
RtlUnwind
VirtualQuery
LockResource
GetFileSize
GlobalReAlloc
LCMapStringA
InterlockedIncrement
SetLastError
GetStdHandle
CloseHandle
SetStdHandle
LocalReAlloc
GetVersion
GetConsoleCP
GetACP
GetModuleFileNameA
SetFileTime
HeapFree
FileTimeToSystemTime
TerminateProcess
SetUnhandledExceptionFilter
LocalAlloc
TlsFree
lstrlenA
HeapAlloc
RaiseException
EnterCriticalSection
HeapReAlloc
GetEnvironmentStrings
DeleteCriticalSection
EnumResourceLanguagesW
GetProcessHeap
GetSystemTimeAsFileTime
HeapDestroy
MulDiv
Sleep
HeapSize
SystemTimeToFileTime
FreeEnvironmentStringsA
CreateFileA
GetThreadLocale
InitializeCriticalSection
DuplicateHandle
CompareStringA
FreeResource
GetConsoleMode
GetCommandLineA
GetFileTime
GetSystemDirectoryA
SetErrorMode
GetSystemInfo
QueryPerformanceCounter
FreeLibrary
GetOEMCP
LeaveCriticalSection
GetVersionExA
GetCurrentThreadId
GetModuleHandleA
LoadLibraryA
GlobalFree
GetProcAddress
GetTimeZoneInformation
GlobalAlloc
GlobalUnlock
ExitProcess
user32
UpdateWindow
KillTimer
SetMenu
SetTimer
WindowFromPoint
GetForegroundWindow
GetMenu
SetScrollInfo
GetWindowRgn
ValidateRect
BringWindowToTop
SetCursor
SetCapture
InvalidateRgn
GetMenuItemCount
TranslateMessage
ScrollWindow
IsRectEmpty
TrackPopupMenu
GetKeyState
GetWindow
UnhookWindowsHookEx
MapDialogRect
GetMenuItemID
SetParent
GetDlgCtrlID
GetScrollRange
CallNextHookEx
AdjustWindowRectEx
GetCursorPos
GetNextDlgGroupItem
DeferWindowPos
GetNextDlgTabItem
GetSysColorBrush
SetWindowContextHelpId
ReleaseCapture
OffsetRect
ClientToScreen
ShowScrollBar
MapWindowPoints
IsZoomed
RedrawWindow
SetScrollPos
InvalidateRect
GetMessageTime
PostQuitMessage
GetFocus
MoveWindow
GetWindowPlacement
SetScrollRange
GetMenuState
EndPaint
GetWindowThreadProcessId
GetDCEx
MessageBeep
EqualRect
LockWindowUpdate
GetSysColor
IsChild
GetLastActivePopup
DrawIcon
SendDlgItemMessageA
GetSystemMenu
EnableMenuItem
InflateRect
SetWindowPos
PtInRect
GetDlgItem
SetWindowRgn
IsIconic
SystemParametersInfoA
GetActiveWindow
GetCapture
BeginPaint
DeleteMenu
SetFocus
GetMenuCheckMarkDimensions
IntersectRect
SetRectEmpty
DestroyIcon
ShowWindow
GetClientRect
CheckMenuItem
SetMenuItemBitmaps
IsWindowEnabled
ReleaseDC
GetWindowRect
SetActiveWindow
EndDialog
GetDesktopWindow
IsWindowVisible
EndDeferWindowPos
ReuseDDElParam
CharUpperA
GetDC
BeginDeferWindowPos
GetSystemMetrics
CopyRect
GetMessagePos
DestroyWindow
ScreenToClient
UnpackDDElParam
SetRect
GetTopWindow
ShowOwnedPopups
GetScrollPos
CreatePopupMenu
DestroyMenu
GetParent
GetSubMenu
IsWindow
FillRect
GetScrollInfo
SetForegroundWindow
UnregisterClassA
GetWindowDC
gdi32
GetDeviceCaps
ExtSelectClipRgn
GetClipBox
CreateCompatibleDC
SetBkColor
DPtoLP
GetTextColor
SetViewportExtEx
RectVisible
SetViewportOrgEx
ExcludeClipRect
Escape
SetRectRgn
SetWindowExtEx
CreateBitmap
OffsetRgn
CreateCompatibleBitmap
RestoreDC
ScaleViewportExtEx
BitBlt
CreatePatternBrush
SaveDC
ScaleWindowExtEx
PtVisible
CombineRgn
GetMapMode
SelectClipRgn
PatBlt
SetTextColor
GetPixel
CreateSolidBrush
CreateRectRgn
Ellipse
SetMapMode
StretchDIBits
IntersectClipRect
SelectObject
OffsetViewportOrgEx
CreateEllipticRgn
DeleteDC
GetStockObject
GetBkColor
GetWindowExtEx
CreateRectRgnIndirect
DeleteObject
GetRgnBox
SetBkMode
advapi32
SetFileSecurityW
RegCloseKey
shell32
DragFinish
ole32
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CreateStreamOnHGlobal
CoRegisterMessageFilter
CoFreeUnusedLibraries
OleFlushClipboard
StgOpenStorageOnILockBytes
CoRevokeClassObject
OleInitialize
CoGetClassObject
OleIsCurrentClipboard
OleUninitialize
CLSIDFromProgID
CoCreateInstance
CLSIDFromString
oleaut32
SysAllocStringLen
SysFreeString
SystemTimeToVariantTime
VariantTimeToSystemTime
VariantInit
VariantChangeType
OleLoadPicture
OleCreateFontIndirect
SysAllocString
VariantClear
SafeArrayDestroy
SysStringLen
VariantCopy
comctl32
ImageList_LoadImageW
shlwapi
PathRemoveExtensionW
PathIsUNCW
PathFindExtensionW
PathFindFileNameW
PathStripToRootW
PathFileExistsW
Sections
.text Size: 551KB - Virtual size: 551KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 262KB - Virtual size: 282KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ