ndjmbtf
Static task
static1
Behavioral task
behavioral1
Sample
39990ec8ddbe1f94ea25bfb7318c779e3ac2fc4835d006e503bc3e5bb0664ae0.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
39990ec8ddbe1f94ea25bfb7318c779e3ac2fc4835d006e503bc3e5bb0664ae0.dll
Resource
win10v2004-20220901-en
General
-
Target
39990ec8ddbe1f94ea25bfb7318c779e3ac2fc4835d006e503bc3e5bb0664ae0
-
Size
128KB
-
MD5
2b8fde2c92f6ee60b43c3b2631963eda
-
SHA1
eb7bd79ac7323676df0301d494df04e6c59fc38e
-
SHA256
39990ec8ddbe1f94ea25bfb7318c779e3ac2fc4835d006e503bc3e5bb0664ae0
-
SHA512
cf346e3746888fa440605a4c083036f8106eaed1e02417b58ac02255ca4906ac93f1a4ae579ddcf1166f031a826e1c5fcec827b068042890ad1f72bd2c6d68c5
-
SSDEEP
3072:2ZUTELyChxpta5czKDNb8mR8aEuEfUE8oRBBD:15sg5cq8UzEfX5RXD
Malware Config
Signatures
Files
-
39990ec8ddbe1f94ea25bfb7318c779e3ac2fc4835d006e503bc3e5bb0664ae0.dll windows x86
d8c55fe1b09f51b6a0b743a3087fe4e3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegSetValueExA
RegOpenKeyExW
FreeSid
RegDeleteKeyW
ChangeServiceConfig2A
RegSetValueExW
RegOpenKeyExA
GetSecurityDescriptorControl
AllocateAndInitializeSid
version
VerQueryValueA
GetFileVersionInfoW
GetFileVersionInfoSizeA
kernel32
RtlUnwind
GetStringTypeW
LCMapStringA
MultiByteToWideChar
IsValidLocale
VirtualAlloc
GetModuleHandleA
GetProcAddress
LoadLibraryA
GetHandleInformation
ResumeThread
HeapSize
GetVersionExA
LCMapStringW
lstrcatA
ResetEvent
InitializeCriticalSection
ReadFile
lstrcpyW
CreateThread
GlobalAlloc
IsValidCodePage
GetTickCount
LocalFree
WriteConsoleW
FindResourceExW
GetShortPathNameA
LocalAlloc
lstrlenW
SetStdHandle
DeleteCriticalSection
LeaveCriticalSection
IsBadWritePtr
CompareStringA
LoadLibraryW
GetCurrentDirectoryA
CreateFileMappingW
CreateDirectoryA
ExpandEnvironmentStringsA
CreateEventW
GlobalHandle
SetCurrentDirectoryA
GetLocalTime
GetStringTypeA
CompareStringW
CreateFileW
ExitProcess
GetLastError
FreeLibrary
WideCharToMultiByte
SetThreadPriority
GetACP
GetVersionExW
LoadResource
GetCurrentProcessId
GetStartupInfoA
GetFileSize
FindResourceW
GetTempPathA
WriteFile
GetModuleHandleW
CreateEventA
GetProcessHeap
GetModuleFileNameA
Sleep
GetConsoleMode
MapViewOfFile
GetCurrentThread
GetCurrentThreadId
GlobalLock
RaiseException
GetTempPathW
InterlockedExchange
GetModuleFileNameW
SizeofResource
lstrcmpW
UnmapViewOfFile
LockResource
GetStdHandle
SetEvent
WriteConsoleA
GetSystemTime
lstrcpyA
CreateFileA
InterlockedDecrement
GetTempFileNameW
HeapReAlloc
EnumSystemLocalesA
CloseHandle
HeapFree
InterlockedCompareExchange
SetFilePointer
CreateMutexW
SetLastError
GetSystemInfo
HeapAlloc
GetFileType
lstrcmpiW
FileTimeToLocalFileTime
HeapDestroy
GetThreadTimes
SetCurrentDirectoryW
GlobalUnlock
IsBadStringPtrW
GetCommandLineA
GetVersion
HeapCreate
VirtualFree
EnterCriticalSection
FatalAppExitA
TerminateProcess
GetCurrentProcess
TlsSetValue
TlsAlloc
TlsFree
TlsGetValue
SetHandleCount
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
UnhandledExceptionFilter
GetCPInfo
GetOEMCP
FlushFileBuffers
SetEndOfFile
Exports
Exports
Sections
.text Size: 56KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 52KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ