DJRXG
Static task
static1
Behavioral task
behavioral1
Sample
72683f843bd4241eefa122259572ac5f8cb3b1370c6a330caf1062adedf60d97.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
72683f843bd4241eefa122259572ac5f8cb3b1370c6a330caf1062adedf60d97.dll
Resource
win10v2004-20220901-en
General
-
Target
72683f843bd4241eefa122259572ac5f8cb3b1370c6a330caf1062adedf60d97
-
Size
476KB
-
MD5
35cedebcbefec4a338efa705ffba9110
-
SHA1
d69328c4d1e246b9269f3deba19846d520e2100e
-
SHA256
72683f843bd4241eefa122259572ac5f8cb3b1370c6a330caf1062adedf60d97
-
SHA512
c7f7275e8d99bb71b118f229700456bf7ed4029895e9cfc02ced7b3bbc11ddff4f071f54d9807847cc2b433bf8969335cd51c6d9edee8e6303adb459b9dcbed1
-
SSDEEP
6144:HC47sS88GPhEt419opMbe/DeFs+77sKMkQw7+fvYrpacy4aQf1:WRaSG+a/Dp+77QwyYreQd
Malware Config
Signatures
Files
-
72683f843bd4241eefa122259572ac5f8cb3b1370c6a330caf1062adedf60d97.dll windows x86
766838dd7009ea51cfa32951d6aaafe2
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteCriticalSection
InitializeCriticalSection
CreateDirectoryA
lstrcatA
lstrcpyA
WritePrivateProfileStringA
GetPrivateProfileStringA
GlobalUnlock
GlobalLock
GlobalAlloc
EnterCriticalSection
CreateFileA
CloseHandle
UnmapViewOfFile
MapViewOfFile
OpenFileMappingA
FreeLibrary
GetModuleHandleA
DisableThreadLibraryCalls
LeaveCriticalSection
GetCurrentProcessId
VirtualAlloc
GetModuleFileNameA
SetFilePointer
VirtualProtect
user32
GetWindowThreadProcessId
IsWindowVisible
IsWindow
GetTopWindow
CallNextHookEx
GetKeyState
RegisterClassExA
GetClassNameA
GetClassInfoExA
SetParent
SetWindowPos
OpenClipboard
EmptyClipboard
GetWindow
SendDlgItemMessageA
wsprintfA
GetDlgItemTextA
SetDlgItemTextA
IsDlgButtonChecked
CheckDlgButton
EnableWindow
SetWindowTextA
ShowWindow
DestroyWindow
PostQuitMessage
GetWindowTextA
KillTimer
GetDlgItem
SendMessageA
GetWindowRect
CloseClipboard
MapWindowPoints
SetClipboardData
advapi32
RegSetValueExA
RegOpenKeyA
RegCloseKey
comctl32
ord17
msvcrt
free
strstr
atoi
_beginthread
sprintf
??3@YAXPAX@Z
??2@YAPAXI@Z
malloc
_adjust_fdiv
_itoa
_initterm
ws2_32
send
shlwapi
PathRemoveFileSpecA
Exports
Exports
Sections
.DJRXGE Size: 224KB - Virtual size: 220KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text0 Size: 56KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text1 Size: 128KB - Virtual size: 127KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 52KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ