CreateProcessNotify
Static task
static1
Behavioral task
behavioral1
Sample
464fd338cf2ec65eb87a8f42de1bc2949cc63ca73f057b9bc5491f5741c77d8e.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
464fd338cf2ec65eb87a8f42de1bc2949cc63ca73f057b9bc5491f5741c77d8e.dll
Resource
win10v2004-20220901-en
General
-
Target
464fd338cf2ec65eb87a8f42de1bc2949cc63ca73f057b9bc5491f5741c77d8e
-
Size
116KB
-
MD5
f3210b32aa3615fa8acfc38a0f9df136
-
SHA1
1a7dda73e3c9d5b1c02b3b4726cd1b11ecf62972
-
SHA256
464fd338cf2ec65eb87a8f42de1bc2949cc63ca73f057b9bc5491f5741c77d8e
-
SHA512
eda6dc9bbd04225376849f555a4b0fa6fef22a3f15883332f8d930f5f1741851f2c946763dbf8e8cb801f8ce25e13f28640308148722e5726122d8b7e10a00b5
-
SSDEEP
3072:GWlItn2QAVo0rZV7+u3AUgO1sOIfs1dkAs:dItArZpAULjIcV
Malware Config
Signatures
Files
-
464fd338cf2ec65eb87a8f42de1bc2949cc63ca73f057b9bc5491f5741c77d8e.dll windows x86
3df9a2c0bb886799b99484d1e58939e9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CreateFileW
ExitProcess
ExpandEnvironmentStringsW
FreeLibrary
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetEnvironmentVariableW
GetLastError
GetModuleFileNameW
GetModuleHandleW
GetProcAddress
GetSystemTimeAsFileTime
GetTickCount
InterlockedCompareExchange
InterlockedExchange
IsDebuggerPresent
LoadLibraryExW
MultiByteToWideChar
QueryPerformanceCounter
ReadFile
SetEnvironmentVariableW
SetUnhandledExceptionFilter
Sleep
TerminateProcess
UnhandledExceptionFilter
WideCharToMultiByte
Exports
Exports
Sections
.text Size: 113KB - Virtual size: 113KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 1024B - Virtual size: 1.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 512B - Virtual size: 81B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 10B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ