Static task
static1
Behavioral task
behavioral1
Sample
44981b4d3b07d44093bcbb5046c91186e60dd233260235a562cde433aa2dffac.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
44981b4d3b07d44093bcbb5046c91186e60dd233260235a562cde433aa2dffac.dll
Resource
win10v2004-20220901-en
General
-
Target
44981b4d3b07d44093bcbb5046c91186e60dd233260235a562cde433aa2dffac
-
Size
208KB
-
MD5
4059871f6e813e90288383136ae98090
-
SHA1
b9bd9d073b260705192f23956bf9baaaf78f2d03
-
SHA256
44981b4d3b07d44093bcbb5046c91186e60dd233260235a562cde433aa2dffac
-
SHA512
d0a7372d63ab9cd40daffc1bb2db26f0a0195355bbef62562c2ca5fd79c58eff514ec6177e186349d85405f5b1c694de1ca90f462fab5226f2d0380c93459e9d
-
SSDEEP
3072:hs0JB2GYMkqNp42oZqI+fugiycy48C1Xf53ZIU2WSS2jbxWGqt7:jBAMNp42fug301vL725SbGq1
Malware Config
Signatures
Files
-
44981b4d3b07d44093bcbb5046c91186e60dd233260235a562cde433aa2dffac.dll windows x86
40979b553eeb0b0bbc1968e04e11ae6f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MultiByteToWideChar
HeapAlloc
GetProcessHeap
HeapFree
GetFileSize
FindNextFileW
FindClose
GlobalAlloc
GlobalLock
GlobalUnlock
QueryPerformanceCounter
GetCurrentProcess
FlushInstructionCache
GetTickCount
GlobalFree
Sleep
FindResourceW
CompareStringW
LoadLibraryA
DeleteAtom
WriteFile
AddAtomW
CreateFileW
GetFileTime
GetCurrentProcessId
GetSystemTimeAsFileTime
VirtualQuery
GetSystemInfo
VirtualAlloc
VirtualProtect
DeleteFileW
InterlockedDecrement
SetCurrentDirectoryW
GetSystemDirectoryW
EnterCriticalSection
LeaveCriticalSection
HeapDestroy
InterlockedIncrement
DeleteCriticalSection
InitializeCriticalSection
lstrcpyW
lstrlenW
GetVersionExW
GetCurrentDirectoryW
CreateProcessW
CloseHandle
GetCommandLineW
OutputDebugStringW
GetFullPathNameW
GetLongPathNameW
ExpandEnvironmentStringsW
lstrcmpiW
lstrcmpW
FreeLibrary
OutputDebugStringA
GetModuleFileNameW
SetLastError
GetLastError
LoadLibraryW
LocalAlloc
LocalFree
GetCurrentThreadId
GetVersion
GetFileAttributesW
GetProcAddress
GetModuleHandleW
GetModuleHandleA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
VirtualFree
RaiseException
FindAtomW
LoadResource
GetWindowsDirectoryW
lstrcpynW
HeapCreate
InterlockedExchange
InterlockedExchangeAdd
FormatMessageW
GlobalReAlloc
CreateDirectoryW
ReadFile
MulDiv
TlsGetValue
HeapReAlloc
LockResource
SizeofResource
GetUserDefaultUILanguage
GetLocaleInfoW
TlsAlloc
TlsFree
TlsSetValue
GetAtomNameW
SetProcessWorkingSetSize
GetVersionExA
FindFirstFileW
VirtualAllocEx
user32
LoadIconA
LoadCursorA
BeginPaint
GetClientRect
EndPaint
PostQuitMessage
DefWindowProcA
gdi32
GetStockObject
CreateEnhMetaFileA
MoveToEx
LineTo
CloseEnhMetaFile
Rectangle
DeleteEnhMetaFile
msvcrt
iswspace
wcsrchr
swscanf
free
__argc
__wargv
realloc
malloc
wcscmp
wcstol
_mbsnbcnt
_mbslen
_CxxThrowException
wcsstr
_wtoi
wcschr
_c_exit
_exit
_XcptFilter
_snwprintf
_cexit
exit
_wcmdln
__wgetmainargs
_initterm
__setusermatherr
_controlfp
_onexit
__dllonexit
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
advapi32
RegCreateKeyExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
UnregisterTraceGuids
RegisterTraceGuidsW
GetTraceLoggerHandle
GetTraceEnableLevel
RegQueryValueExA
RegOpenKeyExA
GetTraceEnableFlags
TraceEvent
RegSetValueExW
Sections
.text Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 165KB - Virtual size: 164KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data4 Size: 512B - Virtual size: 100B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data3 Size: 512B - Virtual size: 100B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data2 Size: 512B - Virtual size: 100B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 752B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ