Static task
static1
Behavioral task
behavioral1
Sample
411b0308865d70b9eadf275c2a13d97958d6de7b3ccf75155240b031ac21cc16.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
411b0308865d70b9eadf275c2a13d97958d6de7b3ccf75155240b031ac21cc16.dll
Resource
win10v2004-20220901-en
General
-
Target
411b0308865d70b9eadf275c2a13d97958d6de7b3ccf75155240b031ac21cc16
-
Size
105KB
-
MD5
fd748d38f8d4e74f33083e20cb121720
-
SHA1
7eb2968296ea3da707a7d10184af6b79c9824d43
-
SHA256
411b0308865d70b9eadf275c2a13d97958d6de7b3ccf75155240b031ac21cc16
-
SHA512
d3adfec0f9c92e0fd9292496e4a59a55bff6c57c6b4ca4ea6b9ee6ce699e9d3739a2ef7d310a9e23d28a53510eaf7519c39fdb67baed403574214326ea4284a0
-
SSDEEP
1536:T2TjfulgdQraiv/nylDQe5bqndF8YvIiFBqLssfaVSng28:yvfusQraivIAd3cfaVSnT8
Malware Config
Signatures
Files
-
411b0308865d70b9eadf275c2a13d97958d6de7b3ccf75155240b031ac21cc16.dll windows x86
1bcffefb934d3ad18a2e436892b0d9d9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeLibrary
GetCommandLineW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetFullPathNameW
GetLastError
GetModuleHandleW
GetPrivateProfileIntW
GetPrivateProfileStringW
GetProcAddress
GetSystemTimeAsFileTime
GetTickCount
GetVersionExW
GlobalAlloc
GlobalFree
FindNextFileW
LocalAlloc
QueryPerformanceCounter
SetFileAttributesW
SetFilePointer
TerminateProcess
UnhandledExceptionFilter
WriteFile
lstrcatW
lstrcmpiW
lstrcpyW
lstrcpynW
GetCurrentThread
VirtualAlloc
CreateFileW
GetStartupInfoA
FindFirstFileW
FindClose
ExitProcess
DeleteFileW
CreateSemaphoreW
LoadLibraryW
CompareStringW
user32
PostMessageW
SendDlgItemMessageW
SendMessageW
SetDlgItemTextW
SetFocus
SetWindowsHookExW
UnhookWindowsHookEx
WinHelpW
MessageBoxW
LoadIconA
GetDlgItem
GetActiveWindow
ExitWindowsEx
EndDialog
DialogBoxParamW
CharUpperW
CallNextHookEx
wsprintfW
GetDlgItemTextW
gdi32
GetStockObject
GetObjectW
CreateFontIndirectW
DeleteObject
advapi32
RegOpenKeyExW
shell32
ShellExecuteW
msvcrt
_except_handler3
__getmainargs
Sections
.55519 Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.55518 Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.55517 Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.55516 Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.55515 Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.55514 Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.55513 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.55512 Size: 89KB - Virtual size: 89KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 404B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ