Static task
static1
Behavioral task
behavioral1
Sample
41360cd13a6ba29e44425838323417c7ae17fad262b10d5f244f709f4947d916.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
41360cd13a6ba29e44425838323417c7ae17fad262b10d5f244f709f4947d916.dll
Resource
win10v2004-20220812-en
General
-
Target
41360cd13a6ba29e44425838323417c7ae17fad262b10d5f244f709f4947d916
-
Size
431KB
-
MD5
36e3895f006b308a37457be56782d930
-
SHA1
b851a5cb0667bf1e9cd80e2c8baf243459593303
-
SHA256
41360cd13a6ba29e44425838323417c7ae17fad262b10d5f244f709f4947d916
-
SHA512
830b9c9481c0d89b3f5356cc58a2d9d1d338f172f53c1f3e3254ace70a8202f76ea3dc1d2d326c6177021219d4abd35f9ee1beefdf1a0655222c17a605de6799
-
SSDEEP
12288:RnaUYQuPdO9Bjys12227Rrgv1FUI2RJ9:BE0tysk22JgvtQ9
Malware Config
Signatures
Files
-
41360cd13a6ba29e44425838323417c7ae17fad262b10d5f244f709f4947d916.dll windows x86
8998356c3160ecdf200df8e00d6eadfc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MapViewOfFile
GetFileSize
CreateFileMappingA
CreateFileA
CreateFileW
CloseHandle
UnmapViewOfFile
GetSystemInfo
IsProcessorFeaturePresent
WriteFile
HeapAlloc
HeapFree
SetLastError
VirtualProtect
FlushInstructionCache
VirtualQuery
GetCurrentThreadId
DecodePointer
GetCommandLineA
InterlockedDecrement
InterlockedIncrement
RtlUnwind
GetModuleHandleW
ExitProcess
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
RaiseException
TlsAlloc
TlsGetValue
TlsSetValue
GetCurrentProcess
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
HeapDestroy
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetStringTypeW
GetUserDefaultLCID
GetLocaleInfoW
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
LCMapStringW
GetModuleFileNameW
SetFilePointer
GetConsoleCP
GetConsoleMode
HeapSize
HeapReAlloc
SetStdHandle
FlushFileBuffers
WriteConsoleW
GetLastError
OutputDebugStringA
lstrcmpiA
GetFullPathNameA
LeaveCriticalSection
DeleteCriticalSection
InterlockedCompareExchange
Sleep
InitializeCriticalSection
InterlockedExchange
EnterCriticalSection
VirtualAlloc
VirtualFree
GetProcAddress
GetModuleHandleA
LoadLibraryA
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
LoadLibraryW
TlsFree
IsBadCodePtr
psapi
GetModuleInformation
gdi32
MoveToEx
ExtTextOutA
CreateCompatibleDC
SetMapMode
SetTextAlign
CreateFontIndirectW
CreateFontIndirectA
GetFontLanguageInfo
GetTextMetricsW
SetBkMode
SetBkColor
SetTextColor
GetCharacterPlacementW
GetCharacterPlacementA
SelectObject
DeleteObject
DeleteDC
CreateDIBSection
GetGlyphOutlineA
GetTextMetricsA
GetObjectW
GetObjectA
ExtTextOutW
advapi32
RegCloseKey
RegQueryValueExA
RegOpenKeyA
Sections
.text Size: 243KB - Virtual size: 243KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 115KB - Virtual size: 114KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 44KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ