XDNHLYJWU
Static task
static1
Behavioral task
behavioral1
Sample
269e733a209524a2cc56d0a36129b1b4afef18565c7ca77c36231e5d0dd1f23f.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
269e733a209524a2cc56d0a36129b1b4afef18565c7ca77c36231e5d0dd1f23f.dll
Resource
win10v2004-20220901-en
General
-
Target
269e733a209524a2cc56d0a36129b1b4afef18565c7ca77c36231e5d0dd1f23f
-
Size
152KB
-
MD5
c47b0b00ead6ff1d1bc577cf17fefbc0
-
SHA1
2016af99105bcb26c545bd93849ed6bcf5dfc364
-
SHA256
269e733a209524a2cc56d0a36129b1b4afef18565c7ca77c36231e5d0dd1f23f
-
SHA512
7e94cda0767a7a370e61a6c45cbdcb93f214d4220bb17e31a2d1088679fdf933508fefa55e380f9ebee9e019c3c93a31f30b29ceaa7b6e8901accb17ee95906d
-
SSDEEP
3072:t0rqBbrnJCunLLh1h6c+ZXCRI4R4iNzuaVotS7cUVh13yGNu4LmGecoRM:tFPRh1sXCqJiNySZVh13Xu4LmGecP
Malware Config
Signatures
Files
-
269e733a209524a2cc56d0a36129b1b4afef18565c7ca77c36231e5d0dd1f23f.dll windows x86
129d85f71bacd86a2daf5f41de030108
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
EqualSid
RegQueryInfoKeyA
RegCreateKeyExA
RegEnumValueA
RegQueryInfoKeyW
RegEnumKeyExA
LookupPrivilegeValueA
RegSetValueExW
LookupAccountSidW
RegSetValueExA
ChangeServiceConfigA
AllocateAndInitializeSid
RegDeleteKeyW
UnlockServiceDatabase
InitializeSecurityDescriptor
RegDeleteValueW
RegQueryValueExW
RegQueryValueW
RegQueryValueExA
RegOpenKeyExW
RegFlushKey
RegCreateKeyW
RegDeleteValueA
RegOpenKeyExA
FreeSid
GetTokenInformation
CloseServiceHandle
ChangeServiceConfig2A
RegCloseKey
RegCreateKeyExW
GetSecurityDescriptorControl
LockServiceDatabase
RegEnumKeyExW
version
GetFileVersionInfoW
GetFileVersionInfoSizeA
GetFileVersionInfoSizeW
VerQueryValueW
kernel32
RtlUnwind
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetProcAddress
IsValidLocale
LoadLibraryA
GetModuleHandleA
GetHandleInformation
CreateProcessA
CreateMutexA
lstrcatA
lstrlenW
lstrcpynW
LocalFree
GlobalHandle
GetSystemTimeAsFileTime
LockResource
HeapCreate
ExpandEnvironmentStringsA
GetCurrentThreadId
SetThreadPriority
SetCurrentDirectoryA
LocalAlloc
HeapSize
CreateFileA
GetLocaleInfoW
GetSystemTime
GlobalReAlloc
WriteConsoleW
GlobalFree
lstrcpyA
WriteConsoleA
WaitForSingleObject
SetPriorityClass
CompareStringW
RaiseException
CreateProcessW
GetConsoleMode
FormatMessageA
GlobalUnlock
GetTickCount
CompareStringA
WriteFile
GetCPInfo
CreateDirectoryW
SetFilePointer
CreateFileW
IsBadReadPtr
VirtualAlloc
ExitProcess
HeapAlloc
GetCommandLineA
GetVersion
HeapDestroy
VirtualFree
HeapFree
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
FatalAppExitA
HeapReAlloc
IsBadWritePtr
TerminateProcess
GetCurrentProcess
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
GetCurrentThread
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
CloseHandle
UnhandledExceptionFilter
GetACP
GetOEMCP
FlushFileBuffers
SetStdHandle
SetEndOfFile
ReadFile
MultiByteToWideChar
Exports
Exports
Sections
.text Size: 76KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 52KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ