Pjbtgzybupb
Static task
static1
Behavioral task
behavioral1
Sample
b6877e9b91d248146a7356be9d4e79afb0db2f4dbbbb5c0781e7bcdb56641d7d.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b6877e9b91d248146a7356be9d4e79afb0db2f4dbbbb5c0781e7bcdb56641d7d.dll
Resource
win10v2004-20221111-en
General
-
Target
b6877e9b91d248146a7356be9d4e79afb0db2f4dbbbb5c0781e7bcdb56641d7d
-
Size
256KB
-
MD5
42993f8416477957dbfbcdf5b295dad0
-
SHA1
8d4a09c45145059e7bf023396cfc45b7af5b7140
-
SHA256
b6877e9b91d248146a7356be9d4e79afb0db2f4dbbbb5c0781e7bcdb56641d7d
-
SHA512
56d3b9ed3154a82155da5f4c6f5db1f4e7b36cc634c168a620449fb192d14fc348098e87955808d53f4231a642b92ecaf881fef73b14796854c63c20718f827d
-
SSDEEP
3072:avDgqnCGwMwD0zxZTB72ckuFQMHkAVxoErmfMCDplpL02Ym4NmVluuv4:WgqnCGwMw87Byb5MHkAprS3pY2YYv4
Malware Config
Signatures
Files
-
b6877e9b91d248146a7356be9d4e79afb0db2f4dbbbb5c0781e7bcdb56641d7d.dll windows x86
98e04d7cc6d120511d6d85ed4109a87f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
CreateDIBitmap
CreateFontW
GetDeviceCaps
RemoveFontResourceA
SetPaletteEntries
AngleArc
Arc
BeginPath
BitBlt
Chord
CloseEnhMetaFile
CombineRgn
CombineTransform
CreateBitmap
CreateCompatibleDC
CreateEnhMetaFileA
CreateFontIndirectW
CreateRectRgn
DPtoLP
DeleteDC
DeleteEnhMetaFile
DeleteObject
Ellipse
EndPath
ExtCreateRegion
ExtSelectClipRgn
FillPath
FlattenPath
GetCurrentPositionEx
GetDIBits
GetObjectA
GetObjectW
GetPaletteEntries
GetPath
GetRandomRgn
GetRegionData
GetRgnBox
GetStockObject
GetWinMetaFileBits
LineTo
ModifyWorldTransform
OffsetViewportOrgEx
PatBlt
Pie
PlayEnhMetaFile
PlgBlt
PolyBezier
PolyBezierTo
PolyDraw
Rectangle
ResizePalette
RestoreDC
RoundRect
SaveDC
SelectClipPath
SelectObject
SelectPalette
SetBkMode
SetDIBits
SetEnhMetaFileBits
SetGraphicsMode
SetMapMode
SetViewportOrgEx
SetWindowOrgEx
SetWorldTransform
StretchBlt
StretchDIBits
StrokeAndFillPath
StrokePath
GetFontResourceInfoW
GetKerningPairsW
UnrealizeObject
kernel32
CancelWaitableTimer
CloseHandle
CreateThread
DebugBreak
FormatMessageA
FormatMessageW
FreeEnvironmentStringsA
FreeEnvironmentStringsW
FreeLibrary
GetBinaryType
GetCurrentProcess
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableW
GetExitCodeProcess
GetExitCodeThread
GetFullPathNameA
GetLocaleInfoA
GetModuleFileNameA
GetModuleFileNameW
GetProcAddress
GetUserDefaultLCID
GetVersionExA
LoadLibraryA
LocalAlloc
LocalFree
MultiByteToWideChar
SetUnhandledExceptionFilter
TerminateProcess
TlsSetValue
UnhandledExceptionFilter
WaitForSingleObject
WideCharToMultiByte
lstrlenA
lstrlenW
VirtualAlloc
HeapUnlock
LocalReAlloc
MulDiv
VirtualProtect
ExitProcess
GetCPInfo
GetCommandLineA
GetCurrentThreadId
GetFileType
GetModuleHandleA
GetOEMCP
GetStartupInfoA
GetStdHandle
GetVersion
GlobalAlloc
GlobalFree
HeapCreate
HeapDestroy
PeekConsoleInputA
SetFilePointer
SetHandleCount
TlsAlloc
TlsFree
TlsGetValue
VirtualFree
WriteFile
CreateEventA
CreateFileW
DefineDosDeviceA
GetProcessHeap
RegisterWaitForSingleObject
ResetEvent
SetEvent
SetInformationJobObject
Sleep
UnregisterWaitEx
WaitForMultipleObjects
GetTimeFormatA
GetDateFormatA
GetLastError
SetEnvironmentVariableW
GetCurrentDirectoryW
SetCurrentDirectoryW
HeapFree
GetStringTypeA
GetStringTypeW
FlushFileBuffers
GetTimeZoneInformation
GetSystemTimeAsFileTime
HeapAlloc
GetSystemInfo
VirtualQuery
SetLastError
GetCurrentThread
GetDriveTypeA
GetCurrentDirectoryA
GetACP
LCMapStringA
LCMapStringW
CompareStringA
CompareStringW
DeleteCriticalSection
LeaveCriticalSection
FatalAppExitA
EnterCriticalSection
HeapReAlloc
IsBadWritePtr
SetStdHandle
RtlUnwind
InterlockedExchange
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
CreateProcessW
GetFileAttributesW
InitializeCriticalSection
SetConsoleCtrlHandler
ReadFile
RaiseException
HeapSize
SetEnvironmentVariableA
GetLocaleInfoW
oleaut32
SafeArrayUnlock
VarBoolFromR4
VarDecFix
VarI1FromStr
LoadRegTypeLi
VarCyRound
VarR4CmpR8
SafeArrayAllocDescriptor
shell32
SHGetMalloc
SHGetPathFromIDListA
SHGetSpecialFolderLocation
ShellExecuteExA
RealShellExecuteA
SHGetDesktopFolder
CheckEscapesW
user32
AttachThreadInput
CallNextHookEx
EnumThreadWindows
FindWindowA
GetDCEx
GetDesktopWindow
GetPriorityClipboardFormat
GetWindowTextA
GetWindowTextLengthA
GetWindowTextLengthW
GetWindowTextW
GetWindowThreadProcessId
IMPQueryIMEW
IsWindowEnabled
IsWindowVisible
LoadStringA
LoadStringW
ModifyMenuA
MsgWaitForMultipleObjects
PeekMessageA
PostMessageW
SendMessageTimeoutW
SetFocus
SetForegroundWindow
wsprintfA
GetWindowWord
InSendMessageEx
SetCursorPos
Exports
Exports
Sections
.text Size: 164KB - Virtual size: 163KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 40KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ