TVSPAOQTY
Static task
static1
Behavioral task
behavioral1
Sample
436f35e891b406cd33659af05eda17d47ff15bd182227d5730b8458d9be91ac8.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
436f35e891b406cd33659af05eda17d47ff15bd182227d5730b8458d9be91ac8.dll
Resource
win10v2004-20221111-en
General
-
Target
436f35e891b406cd33659af05eda17d47ff15bd182227d5730b8458d9be91ac8
-
Size
120KB
-
MD5
495068b174179a077965480fd17b3250
-
SHA1
0e544f2388e8dd53c31ab63935947d9c9f510a67
-
SHA256
436f35e891b406cd33659af05eda17d47ff15bd182227d5730b8458d9be91ac8
-
SHA512
e98d6d0bfb9524405bb3ec3c1ca70cb222580d2500a1f418ff683fa8914c274e4fa0fc674129156fe1d9b6e13995a093b560f53be1c9c2a982ad410afd8a5b13
-
SSDEEP
3072:82bfv+52PuhAN7dtHGSuonomCbCGYM8D/ZO2pq:/s2/5tPT/M8DBj
Malware Config
Signatures
Files
-
436f35e891b406cd33659af05eda17d47ff15bd182227d5730b8458d9be91ac8.dll windows x86
5294cb8e0e931a0267cfd128a9a8748e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
LockServiceDatabase
UnlockServiceDatabase
RegOpenKeyExW
RegDeleteKeyW
RegDeleteValueA
AllocateAndInitializeSid
RegEnumKeyExW
RegCloseKey
RegEnumValueA
RegSetValueExA
RegQueryInfoKeyA
FreeSid
RegQueryInfoKeyW
ChangeServiceConfigA
RegQueryValueExW
RegOpenKeyW
EqualSid
RegCreateKeyExA
RegQueryValueExA
RegQueryValueW
RegDeleteKeyA
RegEnumKeyExA
RegEnumValueW
InitializeSecurityDescriptor
RegFlushKey
RegCreateKeyExW
ChangeServiceConfig2A
RegOpenKeyExA
RegDeleteValueW
RegSetValueExW
LookupPrivilegeValueA
CloseServiceHandle
LookupAccountSidW
GetTokenInformation
version
GetFileVersionInfoSizeW
GetFileVersionInfoA
GetFileVersionInfoW
GetFileVersionInfoSizeA
kernel32
RtlUnwind
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetModuleHandleA
LoadLibraryA
GetHandleInformation
GetProcAddress
IsValidLocale
GetConsoleCP
lstrcmpiW
GetLocaleInfoA
CreateFileMappingW
lstrcmpW
CompareStringW
CopyFileA
GetTempFileNameW
GetCurrentProcessId
CreateThread
SetEndOfFile
LoadResource
FindResourceA
CreateFileA
CreateProcessA
GetFileSize
WaitForSingleObject
GetCurrentThread
lstrcpynW
FindResourceW
VirtualAlloc
ExitProcess
GetSystemTime
HeapAlloc
GetCommandLineA
GetVersion
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
HeapDestroy
HeapCreate
VirtualFree
HeapFree
DeleteCriticalSection
FatalAppExitA
HeapReAlloc
IsBadWritePtr
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
WriteFile
CloseHandle
UnhandledExceptionFilter
GetCPInfo
GetACP
GetOEMCP
FlushFileBuffers
SetStdHandle
ReadFile
SetFilePointer
MultiByteToWideChar
Exports
Exports
Sections
.text Size: 48KB - Virtual size: 46KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 52KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ