erfjlf
Static task
static1
Behavioral task
behavioral1
Sample
48140e41439198b251f950fd4a9f784209fa8f97d62f7a92e4dcc82d6885d277.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
48140e41439198b251f950fd4a9f784209fa8f97d62f7a92e4dcc82d6885d277.dll
Resource
win10v2004-20220812-en
General
-
Target
48140e41439198b251f950fd4a9f784209fa8f97d62f7a92e4dcc82d6885d277
-
Size
120KB
-
MD5
7163502d860f23cfe035732b30b05c20
-
SHA1
add47bcd3276ff9cc1b2092c39af239417a2c876
-
SHA256
48140e41439198b251f950fd4a9f784209fa8f97d62f7a92e4dcc82d6885d277
-
SHA512
4e668a475c0ec9e743cc1c0a5ce35999fe0a2c217a8307dea065dd6a9d0ff632c2cacc415cb7cd218e8d8e724c537048b17f8b0fe3e8b3ee56dcb9a0d8c3294e
-
SSDEEP
3072:rzhfrdMnqXYFMoINkhydzXv83v7FLFFGTUoPPU44:rtfinNMjrk3v7lTiUoPP
Malware Config
Signatures
Files
-
48140e41439198b251f950fd4a9f784209fa8f97d62f7a92e4dcc82d6885d277.dll windows x86
42422a9f29912f560b55c3fa5560f00f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
CloseServiceHandle
LockServiceDatabase
RegQueryValueExA
RegCreateKeyExW
LookupAccountSidW
RegEnumValueA
RegQueryInfoKeyA
RegDeleteKeyA
RegCreateKeyW
RegCloseKey
LookupPrivilegeValueA
RegQueryInfoKeyW
UnlockServiceDatabase
EqualSid
RegEnumKeyExA
FreeSid
RegQueryValueW
InitializeSecurityDescriptor
ChangeServiceConfigA
RegSetValueExA
GetTokenInformation
RegFlushKey
RegOpenKeyW
version
GetFileVersionInfoW
kernel32
RtlUnwind
GetStringTypeA
GetHandleInformation
GetModuleHandleA
GetProcAddress
IsValidLocale
LoadLibraryA
VirtualAlloc
VirtualFree
GetSystemTimeAsFileTime
ResetEvent
HeapReAlloc
SizeofResource
GlobalHandle
GetFileSize
Sleep
GetStringTypeW
GetStdHandle
GetCurrentThreadId
CreateEventW
SetPriorityClass
CreateFileA
CreateFileMappingA
CreateDirectoryA
lstrcmpiW
SetStdHandle
lstrcpynW
WaitForSingleObject
SetEnvironmentVariableA
LocalFree
LocalAlloc
lstrcpyW
InterlockedDecrement
IsBadStringPtrW
GetSystemInfo
GetStartupInfoA
GetThreadLocale
GetVersionExA
ReleaseMutex
GetLocaleInfoW
HeapDestroy
SetCurrentDirectoryA
SearchPathA
HeapFree
CreateThread
lstrlenA
QueryPerformanceCounter
CreateEventA
WideCharToMultiByte
DeleteCriticalSection
ExitProcess
GetSystemTime
HeapAlloc
GetCommandLineA
GetVersion
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
HeapCreate
FatalAppExitA
IsBadWritePtr
TerminateProcess
GetCurrentProcess
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
GetCurrentThread
SetHandleCount
GetFileType
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
WriteFile
CloseHandle
UnhandledExceptionFilter
GetCPInfo
GetACP
GetOEMCP
FlushFileBuffers
SetEndOfFile
ReadFile
SetFilePointer
MultiByteToWideChar
LCMapStringA
LCMapStringW
Exports
Exports
Sections
.text Size: 48KB - Virtual size: 46KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 52KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ