Static task
static1
Behavioral task
behavioral1
Sample
f000d88a2300dc32df4cd67e6c7b7883d20b786adbc0477e3b58d9e6f08cf7b6.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f000d88a2300dc32df4cd67e6c7b7883d20b786adbc0477e3b58d9e6f08cf7b6.dll
Resource
win10v2004-20221111-en
General
-
Target
f000d88a2300dc32df4cd67e6c7b7883d20b786adbc0477e3b58d9e6f08cf7b6
-
Size
400KB
-
MD5
0fdb9066bb9a981a477c27f4d18138a1
-
SHA1
4c7b2b0a44cccdd912686704ca71c40f0aa95b0c
-
SHA256
f000d88a2300dc32df4cd67e6c7b7883d20b786adbc0477e3b58d9e6f08cf7b6
-
SHA512
2bb935c7698db2e6c4245e63854e2b7b8746afa7622476d457ac14af4cccc788962e7f18b70b9a02416d2fa1df159ddd753e7298ffcff72016b1e53551c3c772
-
SSDEEP
6144:w0AhAjspbnShNpPwhXx7uL7eBWuhzhG7kwIue/46sxHMiZVWSpgmv1FGdT8Y4SGQ:aAYkpPQZyKBfh72ew6sxsiPNtuKk/3
Malware Config
Signatures
Files
-
f000d88a2300dc32df4cd67e6c7b7883d20b786adbc0477e3b58d9e6f08cf7b6.dll windows x86
023858c7e207e3ce54328a90f69f8e80
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
SHEnumKeyExA
SHCopyKeyW
HashData
kernel32
DeviceIoControl
GetExitCodeProcess
GetExitCodeThread
GetModuleHandleA
GetProcessVersion
GetStdHandle
IsValidLocale
ReleaseSemaphore
ResetEvent
GetStartupInfoA
lstrcmpA
SetCurrentDirectoryA
GetDriveTypeW
GetWindowsDirectoryW
lstrcmpW
GetSystemDirectoryA
GetWindowsDirectoryA
ole32
OleRun
user32
ReleaseDC
advapi32
GetUserNameW
RegLoadKeyA
msvcrt
malloc
free
toupper
winmm
DrvGetModuleHandle
timeGetDevCaps
Sections
.text Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 348KB - Virtual size: 347KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
idata Size: 4KB - Virtual size: 1B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 768B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ