Static task
static1
Behavioral task
behavioral1
Sample
2c01c0dc3613f4ec5e1347cb3db5452d90e1124cbf10fcc6142ac34613c59cba.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2c01c0dc3613f4ec5e1347cb3db5452d90e1124cbf10fcc6142ac34613c59cba.dll
Resource
win10v2004-20220812-en
General
-
Target
2c01c0dc3613f4ec5e1347cb3db5452d90e1124cbf10fcc6142ac34613c59cba
-
Size
840KB
-
MD5
73b754c8d398020ecb4247d8a08731d0
-
SHA1
8738095b5aa8ef83cf99f83d80e3910f4b1392bd
-
SHA256
2c01c0dc3613f4ec5e1347cb3db5452d90e1124cbf10fcc6142ac34613c59cba
-
SHA512
477a923091f148a512768c3264fa65b41a13b2e270c5b0e14e15093dd035647d4b8d1225ec19483c63eca97dbf58b94b146b078fbb30ad54e0859f55c3ea5967
-
SSDEEP
24576:W62ckLifPV5/EGrsWZqR3qbc09Fh8ThdS1r+zM:rN5HsWk6bc09F0O
Malware Config
Signatures
Files
-
2c01c0dc3613f4ec5e1347cb3db5452d90e1124cbf10fcc6142ac34613c59cba.dll windows x86
3879656261145a2f1a33c1fc89a73624
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalHandle
FreeEnvironmentStringsA
UnlockFile
SetEndOfFile
MulDiv
GetLastError
lstrcmpA
WriteFile
InterlockedDecrement
GlobalUnlock
SetUnhandledExceptionFilter
GetCommandLineA
FlushFileBuffers
TlsGetValue
ReadFile
GetACP
SetErrorMode
CloseHandle
RtlUnwind
GetLocaleInfoA
GetConsoleOutputCP
GetFileTime
TerminateProcess
VirtualAlloc
LCMapStringA
GetStdHandle
LeaveCriticalSection
GlobalFree
GetOEMCP
GetCommandLineW
GetModuleFileNameA
GetProcessHeap
FreeResource
QueryPerformanceCounter
GetSystemInfo
GetVersionExA
FileTimeToSystemTime
TlsAlloc
CreateFileA
DeleteCriticalSection
SetStdHandle
GetEnvironmentStrings
GetThreadLocale
FindClose
ConvertDefaultLocale
Sleep
HeapReAlloc
HeapCreate
HeapSize
HeapFree
InitializeCriticalSection
SetEnvironmentVariableA
GetModuleHandleA
LockFile
WriteConsoleA
FileTimeToLocalFileTime
HeapDestroy
DuplicateHandle
GetCurrentProcessId
UnhandledExceptionFilter
InterlockedExchange
TlsSetValue
InterlockedIncrement
SystemTimeToFileTime
IsDebuggerPresent
GlobalLock
SetHandleCount
LoadResource
HeapAlloc
GetSystemTimeAsFileTime
GetTimeZoneInformation
LockResource
GetSystemDirectoryA
VirtualFree
GlobalDeleteAtom
GetConsoleCP
GlobalReAlloc
LocalReAlloc
SetFileTime
FreeLibrary
GetStartupInfoA
GetCurrentThread
TlsFree
LocalFileTimeToFileTime
GetWindowsDirectoryA
GetStringTypeA
GlobalFlags
RaiseException
GlobalAlloc
GetConsoleMode
GetVersion
EnumResourceLanguagesW
SizeofResource
VirtualQuery
SetLastError
GetFileType
EnterCriticalSection
CompareStringA
GetFileSize
SetFilePointer
lstrcpyA
LocalFree
GetCurrentThreadId
LocalAlloc
LoadLibraryA
GetProcAddress
lstrcatA
lstrlenA
ExitProcess
user32
PtInRect
DestroyIcon
GetLastActivePopup
GetWindowRect
GetDC
GetWindow
InflateRect
IsWindow
ValidateRect
BeginDeferWindowPos
AdjustWindowRectEx
GetNextDlgTabItem
GetTopWindow
MessageBeep
SetCursor
SetRectEmpty
EnableMenuItem
GetScrollPos
SetActiveWindow
GetWindowRgn
GetWindowPlacement
EqualRect
LockWindowUpdate
CreatePopupMenu
GetForegroundWindow
WindowFromPoint
IsZoomed
UnpackDDElParam
GetWindowDC
GetScrollRange
SetParent
GetSystemMenu
TrackPopupMenu
ReleaseDC
GetMenuCheckMarkDimensions
GetParent
ScreenToClient
FillRect
GetMenuState
SetCapture
SetScrollInfo
DeferWindowPos
SetFocus
GetDlgItem
GetScrollInfo
SetMenu
UnregisterClassA
GetSystemMetrics
MapDialogRect
GetMenuItemCount
SendDlgItemMessageA
GetDCEx
InvalidateRect
GetMessageTime
SetTimer
KillTimer
CheckMenuItem
SetScrollRange
DestroyMenu
GetSysColor
TranslateMessage
GetCursorPos
PostQuitMessage
ShowOwnedPopups
ClientToScreen
UpdateWindow
SetWindowRgn
GetMessagePos
CopyRect
GetKeyState
IsWindowVisible
SetWindowContextHelpId
GetNextDlgGroupItem
DestroyWindow
SystemParametersInfoA
GetClientRect
BeginPaint
ReuseDDElParam
SetWindowPos
DrawIcon
DeleteMenu
IsChild
MapWindowPoints
ScrollWindow
IntersectRect
SetMenuItemBitmaps
GetMenu
GetSysColorBrush
GetWindowThreadProcessId
EndPaint
SetForegroundWindow
MoveWindow
ShowScrollBar
CharUpperA
IsWindowEnabled
GetMenuItemID
UnhookWindowsHookEx
GetDlgCtrlID
GetFocus
SetScrollPos
GetSubMenu
ShowWindow
ReleaseCapture
InvalidateRgn
BringWindowToTop
EndDialog
IsRectEmpty
EndDeferWindowPos
CallNextHookEx
IsIconic
RedrawWindow
OffsetRect
GetActiveWindow
GetDesktopWindow
GetCapture
SetRect
gdi32
StretchDIBits
PatBlt
DeleteDC
ScaleViewportExtEx
SetViewportExtEx
GetRgnBox
SetBkColor
GetDeviceCaps
GetMapMode
SetTextColor
ScaleWindowExtEx
CreateRectRgnIndirect
ExcludeClipRect
CombineRgn
IntersectClipRect
CreateEllipticRgn
CreateSolidBrush
CreateBitmap
DeleteObject
SetBkMode
Escape
SetViewportOrgEx
CreatePatternBrush
Ellipse
SelectClipRgn
SetRectRgn
CreateCompatibleBitmap
RestoreDC
GetStockObject
ExtSelectClipRgn
GetPixel
RectVisible
GetClipBox
SelectObject
SetMapMode
OffsetRgn
CreateCompatibleDC
GetBkColor
GetTextColor
OffsetViewportOrgEx
DPtoLP
GetWindowExtEx
SetWindowExtEx
SaveDC
BitBlt
CreateRectRgn
PtVisible
advapi32
SetFileSecurityW
RegCloseKey
ole32
CoGetClassObject
CoCreateInstance
OleUninitialize
CLSIDFromProgID
OleIsCurrentClipboard
CLSIDFromString
StgOpenStorageOnILockBytes
CoFreeUnusedLibraries
CreateStreamOnHGlobal
OleInitialize
CoRegisterMessageFilter
StgCreateDocfileOnILockBytes
OleFlushClipboard
CreateILockBytesOnHGlobal
CoRevokeClassObject
oleaut32
SysAllocString
SysFreeString
VariantInit
SysAllocStringLen
VariantTimeToSystemTime
OleCreateFontIndirect
OleLoadPicture
SafeArrayDestroy
VariantClear
VariantCopy
SysStringLen
VariantChangeType
SystemTimeToVariantTime
comctl32
ImageList_LoadImageW
shlwapi
PathFindFileNameW
PathRemoveExtensionW
PathFindExtensionW
PathStripToRootW
PathIsUNCW
PathFileExistsW
Sections
.text Size: 550KB - Virtual size: 550KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 259KB - Virtual size: 280KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ