Static task
static1
Behavioral task
behavioral1
Sample
a809ba80e15b2eddf277fece66addac8e32ee19610bcbb3bfa3afb262c58ea25.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a809ba80e15b2eddf277fece66addac8e32ee19610bcbb3bfa3afb262c58ea25.dll
Resource
win10v2004-20220812-en
General
-
Target
a809ba80e15b2eddf277fece66addac8e32ee19610bcbb3bfa3afb262c58ea25
-
Size
835KB
-
MD5
ac0e1c78c105a61041cbc0f8f25f7ce0
-
SHA1
cee73a90a51b5d38a240bc066d827ab76b93b0c5
-
SHA256
a809ba80e15b2eddf277fece66addac8e32ee19610bcbb3bfa3afb262c58ea25
-
SHA512
8a8b67427d4186df9a0e63865017025c48fd7f6e52a930de1f3f1a1f401b8aed637f2c5dba6f41eac5c4236776a197ea92e5a835b0d41096b695e49dc8f2785a
-
SSDEEP
24576:UMdJpSs02IgdZZSO0USlby9ZtmrdeSINtyTd:cX2/6CSlW9vSINoTd
Malware Config
Signatures
Files
-
a809ba80e15b2eddf277fece66addac8e32ee19610bcbb3bfa3afb262c58ea25.dll windows x86
8e54b6e72e41e58a0907faf3b1400c58
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
GetEnvironmentStrings
CompareStringA
FlushFileBuffers
RtlUnwind
GetSystemInfo
VirtualAlloc
GetConsoleMode
InterlockedExchange
HeapAlloc
GlobalFlags
LocalAlloc
FindClose
HeapSize
GetVersionExA
IsDebuggerPresent
LoadResource
GetCurrentThreadId
ReadFile
GlobalAlloc
Sleep
GetModuleFileNameA
lstrlenA
TlsFree
VirtualProtect
GetCommandLineA
GlobalHandle
GetStartupInfoA
SetStdHandle
SetEnvironmentVariableA
GetCurrentThread
LockFile
GetFileSize
LocalFree
GetSystemTimeAsFileTime
GetFileTime
GetCommandLineW
WriteConsoleA
VirtualFree
GlobalLock
GetACP
GetThreadLocale
CloseHandle
LockResource
lstrcmpA
SetHandleCount
GetFileType
SizeofResource
DeleteCriticalSection
HeapFree
SetLastError
MulDiv
GetConsoleCP
LocalReAlloc
HeapCreate
GetLastError
TlsAlloc
SetFilePointer
QueryPerformanceCounter
GetWindowsDirectoryA
FreeResource
FileTimeToSystemTime
GetStringTypeA
GetProcessHeap
GetLocaleInfoA
LeaveCriticalSection
WriteFile
FileTimeToLocalFileTime
LocalFileTimeToFileTime
SetErrorMode
RaiseException
FreeEnvironmentStringsA
InterlockedDecrement
HeapReAlloc
EnterCriticalSection
VirtualQuery
GlobalUnlock
InterlockedIncrement
DuplicateHandle
GetStdHandle
GetTimeZoneInformation
GetOEMCP
TlsGetValue
SetFileTime
GlobalDeleteAtom
UnlockFile
InitializeCriticalSection
UnhandledExceptionFilter
TerminateProcess
FreeLibrary
ConvertDefaultLocale
LCMapStringA
HeapDestroy
GlobalFree
SetEndOfFile
GlobalReAlloc
GetConsoleOutputCP
SetUnhandledExceptionFilter
LoadLibraryA
EnumResourceLanguagesW
GetSystemDirectoryA
SystemTimeToFileTime
GetCurrentProcessId
GetVersion
LoadLibraryExA
GetModuleHandleA
AddAtomA
GetProcAddress
GetTickCount
TlsSetValue
ExitProcess
user32
GetLastActivePopup
GetMenu
WindowFromPoint
BeginPaint
SetScrollInfo
LockWindowUpdate
SetScrollRange
SystemParametersInfoA
SetCapture
DeferWindowPos
IsIconic
GetMessageTime
GetWindowPlacement
IsWindowVisible
GetDlgItem
SetActiveWindow
GetDCEx
GetSysColor
AdjustWindowRectEx
PostQuitMessage
ReleaseCapture
InvalidateRect
GetWindowDC
GetKeyState
BringWindowToTop
UnpackDDElParam
UnhookWindowsHookEx
GetMenuItemCount
EndDeferWindowPos
EnableMenuItem
IntersectRect
KillTimer
GetNextDlgTabItem
ShowScrollBar
GetMenuState
GetSystemMetrics
ReleaseDC
ClientToScreen
SetRect
MapWindowPoints
CopyRect
SetFocus
GetCursorPos
ValidateRect
ReuseDDElParam
GetDC
EndPaint
MapDialogRect
DrawIcon
SetMenu
IsWindow
SetWindowContextHelpId
SetTimer
ShowWindow
SetRectEmpty
IsZoomed
PtInRect
GetScrollInfo
GetMessagePos
SetParent
IsWindowEnabled
OffsetRect
GetWindowRect
TrackPopupMenu
GetSystemMenu
SetWindowRgn
SetWindowPos
GetWindowRgn
GetScrollPos
DeleteMenu
GetFocus
UpdateWindow
InflateRect
GetCapture
SetScrollPos
DestroyMenu
IsChild
SetCursor
MessageBeep
GetMenuCheckMarkDimensions
MoveWindow
UnregisterClassA
SetMenuItemBitmaps
GetClientRect
GetSubMenu
GetWindowThreadProcessId
CheckMenuItem
IsRectEmpty
GetParent
BeginDeferWindowPos
GetDlgCtrlID
SetForegroundWindow
ScreenToClient
TranslateMessage
DestroyIcon
EqualRect
GetNextDlgGroupItem
SendDlgItemMessageA
CreatePopupMenu
ScrollWindow
GetScrollRange
GetDesktopWindow
GetTopWindow
DestroyWindow
GetForegroundWindow
FillRect
GetWindow
CallNextHookEx
ShowOwnedPopups
GetMenuItemID
GetSysColorBrush
GetActiveWindow
RedrawWindow
EndDialog
InvalidateRgn
gdi32
GetMapMode
CreateSolidBrush
GetRgnBox
BitBlt
ExcludeClipRect
OffsetRgn
CreateBitmap
IntersectClipRect
GetWindowExtEx
GetDeviceCaps
SetViewportExtEx
CreatePatternBrush
CreateRectRgn
SelectObject
Ellipse
DeleteObject
SetRectRgn
ExtSelectClipRgn
DeleteDC
StretchDIBits
SetTextColor
SaveDC
CreateCompatibleDC
PatBlt
SelectClipRgn
GetPixel
OffsetViewportOrgEx
CombineRgn
CreateEllipticRgn
SetMapMode
CreateCompatibleBitmap
SetBkMode
GetStockObject
GetTextColor
ScaleViewportExtEx
SetWindowExtEx
PtVisible
RestoreDC
GetClipBox
RectVisible
SetViewportOrgEx
CreateRectRgnIndirect
GetBkColor
SetBkColor
DPtoLP
Escape
ScaleWindowExtEx
advapi32
SetFileSecurityW
RegCloseKey
shell32
DragAcceptFiles
DragFinish
ole32
CoRegisterMessageFilter
CreateStreamOnHGlobal
CreateILockBytesOnHGlobal
CoCreateInstance
OleInitialize
CLSIDFromString
StgCreateDocfileOnILockBytes
CoRevokeClassObject
CoFreeUnusedLibraries
OleUninitialize
CLSIDFromProgID
CoTaskMemFree
StgOpenStorageOnILockBytes
CoTaskMemAlloc
OleFlushClipboard
CoGetClassObject
OleIsCurrentClipboard
oleaut32
VariantChangeType
OleCreateFontIndirect
OleLoadPicture
SafeArrayDestroy
SysAllocString
VariantInit
VariantCopy
VariantClear
SystemTimeToVariantTime
VariantTimeToSystemTime
SysAllocStringLen
SysStringLen
SysFreeString
comctl32
ImageList_LoadImageW
shlwapi
PathStripToRootW
PathIsUNCW
PathFindFileNameW
PathRemoveExtensionW
PathFindExtensionW
PathFileExistsW
userenv
UnloadUserProfile
Sections
.text Size: 486KB - Virtual size: 485KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 344KB - Virtual size: 362KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 912B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ