Static task
static1
Behavioral task
behavioral1
Sample
765592749a312e3a8bb7c9cb96855b5bae17858495edc86ad255bf9ea4520581.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
765592749a312e3a8bb7c9cb96855b5bae17858495edc86ad255bf9ea4520581.dll
Resource
win10v2004-20220901-en
General
-
Target
765592749a312e3a8bb7c9cb96855b5bae17858495edc86ad255bf9ea4520581
-
Size
36KB
-
MD5
636f03aa937761ba4a0b547a79d1a978
-
SHA1
35c4f830dffcc252876b974dc3ba961c344ef13c
-
SHA256
765592749a312e3a8bb7c9cb96855b5bae17858495edc86ad255bf9ea4520581
-
SHA512
bab0837ace877e931bd415e38ea22b1435e56918bd00fdcb0fd87c654913129e8561b6d1e8da5353fa8fbec2957e9ff2ac6b5c56cdb60bf2775c8bb17bdd7d25
-
SSDEEP
384:7St9L7smezFQpNVSQdiSe0THSCm5E57kfX15Y8cDbpU93LcpY93L0R08fum99ERB:UFsGf9W0bSC7kf6bpacp20R3fum4jOvW
Malware Config
Signatures
Files
-
765592749a312e3a8bb7c9cb96855b5bae17858495edc86ad255bf9ea4520581.dll windows x86
dec64b410148f8175ade5dda816156c5
Code Sign
57:94:71:11:1d:3a:8c:b3:4b:67:fb:eb:0b:04:b5:02Certificate
IssuerCN=Root AgencyNot Before06/05/2010, 06:41Not After31/12/2039, 23:59SubjectCN=Microsofft VMM模块Signer
Actual PE DigestDigest AlgorithmPE Digest MatchesfalseHeaders
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
InterlockedIncrement
GetModuleFileNameA
lstrlenA
HeapDestroy
DeleteCriticalSection
DisableThreadLibraryCalls
InitializeCriticalSection
FlushInstructionCache
GetCurrentProcess
GetTickCount
Sleep
lstrcatA
GetProcAddress
GetFileAttributesA
GetWindowsDirectoryA
GetShortPathNameA
DebugBreak
OutputDebugStringA
lstrcpynW
lstrcpynA
EnterCriticalSection
GetVersionExA
GetCurrentThreadId
LeaveCriticalSection
InterlockedDecrement
GetSystemDirectoryA
user32
GetMenuItemInfoA
AppendMenuA
GetMenuItemCount
CreatePopupMenu
TrackPopupMenuEx
GetMonitorInfoA
MonitorFromPoint
IsWindow
MapWindowPoints
PtInRect
RemoveMenu
GetTopWindow
GetClassNameA
GetParent
GetWindow
SendMessageA
GetWindowTextA
GetClientRect
SetFocus
InvalidateRect
DestroyMenu
TranslateMessage
GetMessageA
CallWindowProcA
GetWindowLongA
GetCursorPos
GetWindowRect
SetCursorPos
mouse_event
GetDesktopWindow
SetForegroundWindow
KillTimer
PostMessageA
GetLastInputInfo
SetTimer
DefWindowProcA
TranslateAcceleratorA
GetClassInfoExA
LoadCursorA
wsprintfA
LoadImageA
RegisterClassExA
SetWindowLongA
CreateWindowExA
LoadStringA
LoadMenuA
DispatchMessageA
MessageBeep
LoadStringW
CharNextA
wvsprintfA
SetWindowPos
LoadAcceleratorsA
DestroyWindow
FindWindowA
ShowWindow
PeekMessageA
PostQuitMessage
advapi32
RegCloseKey
RegCreateKeyExA
RegSetValueExA
RegOpenKeyA
RegQueryValueExA
shell32
ShellExecuteA
SHGetSpecialFolderPathA
ole32
OleUninitialize
OleInitialize
msvcrt
atoi
isdigit
wcslen
strstr
_initterm
_purecall
??2@YAPAXI@Z
memmove
realloc
free
__CxxFrameHandler
strrchr
??3@YAXPAX@Z
malloc
_adjust_fdiv
time
shlwapi
PathFindFileNameA
Exports
Exports
Aetxml
BetDml
DllRundll
GetDDaa
setxml
sssweew
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 748B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ