DPYJUBVO
Static task
static1
Behavioral task
behavioral1
Sample
9c991dc0d468057e96de6e65a2d0fdabafd8b22b2df9ab57fa131d8e02fbc51c.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
9c991dc0d468057e96de6e65a2d0fdabafd8b22b2df9ab57fa131d8e02fbc51c.dll
Resource
win10v2004-20220812-en
General
-
Target
9c991dc0d468057e96de6e65a2d0fdabafd8b22b2df9ab57fa131d8e02fbc51c
-
Size
112KB
-
MD5
e9af8aa2f846c317e341bfd61410c6f0
-
SHA1
9f4a5e3a13ffaa90a29d8575d36ead58563277e4
-
SHA256
9c991dc0d468057e96de6e65a2d0fdabafd8b22b2df9ab57fa131d8e02fbc51c
-
SHA512
acbcd2d725094e7bdff3dccd9dbdaf97c914b0dd649b065d8851afa797285f9e1a54e92b7a737d5ed6ea150a903dc9e12cabd8c9cd2469b884735ae9c03434aa
-
SSDEEP
1536:xkXxJ5We0GxbZJtDBJR8KTtuKwp7ZZiJwN3gMMUYo6yAU9LQYDBo8dHKThxfXRiv:xKxdDBcFK0N3+UYo6yAAXakKjXRi2
Malware Config
Signatures
Files
-
9c991dc0d468057e96de6e65a2d0fdabafd8b22b2df9ab57fa131d8e02fbc51c.dll windows x86
c9f872e23999b586b6a1f8bf624e1955
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegDeleteKeyA
RegSetValueExW
version
VerQueryValueW
GetFileVersionInfoA
kernel32
RtlUnwind
GetStringTypeW
GetStringTypeA
GetModuleHandleA
LoadLibraryA
GetProcAddress
IsValidLocale
GetHandleInformation
GetLocalTime
LCMapStringW
GetConsoleMode
SetEndOfFile
GetSystemTimeAsFileTime
lstrlenA
IsBadReadPtr
SetLastError
MapViewOfFile
GetModuleFileNameA
GetFileTime
LoadResource
GetConsoleCP
CreateFileA
GetTempFileNameA
GetThreadLocale
Sleep
CompareStringW
SizeofResource
LoadLibraryW
CreateFileW
SetEnvironmentVariableA
lstrcpynW
VirtualAlloc
CreateMutexW
GetShortPathNameA
FormatMessageA
LocalFree
GetVersionExA
GetCurrentDirectoryA
CreateDirectoryW
GetLocaleInfoA
CopyFileA
CreateFileMappingA
FileTimeToLocalFileTime
GlobalReAlloc
CloseHandle
ExitProcess
GetSystemTime
HeapAlloc
GetCommandLineA
GetVersion
HeapDestroy
HeapCreate
VirtualFree
HeapFree
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
FatalAppExitA
HeapReAlloc
IsBadWritePtr
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
TlsGetValue
GetLastError
GetCurrentThread
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
WriteFile
UnhandledExceptionFilter
GetCPInfo
GetACP
GetOEMCP
FlushFileBuffers
SetStdHandle
ReadFile
SetFilePointer
MultiByteToWideChar
LCMapStringA
Exports
Exports
Sections
.text Size: 44KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 52KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ