Static task
static1
Behavioral task
behavioral1
Sample
06e91022dee587d9103abb2b9e1ee4db923be4d07a1ddebf26cd2bd40a9221d7.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
06e91022dee587d9103abb2b9e1ee4db923be4d07a1ddebf26cd2bd40a9221d7.dll
Resource
win10v2004-20220901-en
General
-
Target
06e91022dee587d9103abb2b9e1ee4db923be4d07a1ddebf26cd2bd40a9221d7
-
Size
225KB
-
MD5
ddbdf2ca7c597a105bd1713590666600
-
SHA1
89c16f005405fff5391bf456d20653fddd058eb9
-
SHA256
06e91022dee587d9103abb2b9e1ee4db923be4d07a1ddebf26cd2bd40a9221d7
-
SHA512
7cd075e44914d4a0c0f8d88d0f1958197190b98c48a68a99466a4947e4258c7a409cce85ffa8f65b1dcc9bcad77059c7592b557342d8b8ada96ebe18e10e0e39
-
SSDEEP
3072:TC+e5JdA6Xvr3Txl2yIvZQWOmQixJMaySQ46MBXzO8M6AL/pog5MFtVXJc:++gJhzDxlgvZQWQsacBXPw5StZJ
Malware Config
Signatures
Files
-
06e91022dee587d9103abb2b9e1ee4db923be4d07a1ddebf26cd2bd40a9221d7.dll windows x86
0b956dbbdcc71758c02bc4cc21a736f5
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42u
ord6379
ord6466
ord538
ord2810
ord4155
ord6266
ord4831
ord2836
ord2099
ord1008
ord6451
ord3871
ord2385
ord5446
ord6390
ord1197
ord4371
ord4352
ord567
ord3635
ord3365
ord5286
ord4396
ord1768
ord6051
ord2574
ord693
ord6237
ord942
ord2520
ord771
ord496
ord6667
ord3281
ord5977
ord2634
ord6195
ord3867
ord3087
ord535
ord858
ord4197
ord4273
ord925
ord561
ord3733
ord3396
ord5710
ord4692
ord5298
ord5193
ord1089
ord3917
ord5727
ord2504
ord2546
ord4480
ord6371
ord815
ord3948
ord2717
ord5436
ord537
ord656
ord4238
ord3084
ord4470
ord1560
ord350
ord3611
ord3122
ord5647
ord1662
ord2644
ord268
ord6688
ord6211
ord5679
ord2776
ord5438
ord3313
ord665
ord5180
ord354
ord4279
ord4294
ord539
ord6921
ord6919
ord4270
ord3605
ord3397
ord6898
ord3993
ord6896
ord5706
ord927
ord3296
ord941
ord4272
ord6640
ord2755
ord2756
ord4124
ord3792
ord922
ord600
ord1571
ord1250
ord1248
ord1563
ord1194
ord1240
ord342
ord1179
ord1570
ord1568
ord1173
ord1115
ord269
ord826
ord2036
ord2440
ord861
ord4847
ord641
ord2371
ord2859
ord1143
ord1637
ord2858
ord2430
ord4215
ord2576
ord3649
ord1165
ord3658
ord4370
ord4704
ord5830
ord5276
ord3592
ord324
ord4229
ord6024
ord4829
ord5155
ord5156
ord5154
ord4899
ord4736
ord4970
ord4942
ord5261
ord4848
ord4992
ord2506
ord6048
ord4073
ord1767
ord4401
ord5237
ord2377
ord5157
ord6370
ord4347
ord5283
ord3793
ord4435
ord2640
ord2047
ord6372
ord3744
ord5059
ord1720
ord5257
ord2438
ord2116
ord5273
ord4621
ord4419
ord3694
ord489
ord540
ord768
ord800
ord4253
ord2606
ord2910
ord5568
ord940
ord823
ord2388
ord3341
ord5296
ord4074
ord5303
ord5285
ord2977
ord3142
ord3254
ord4459
ord3131
ord3257
ord2980
ord3076
ord2971
ord3825
ord3826
ord3820
ord3074
ord4075
ord4616
ord4418
ord2248
ord1128
ord825
atl
ord15
ord43
ord44
ord45
ord32
ord16
ord21
ord18
ord22
ntdll
RtlCreateUnicodeString
RtlFreeUnicodeString
kernel32
ResetEvent
GetCurrentThreadId
InitializeCriticalSection
GetSystemWindowsDirectoryW
GetVersion
GetFileAttributesW
GetProcAddress
WaitForSingleObject
SetEvent
GetModuleHandleW
LoadLibraryW
GetModuleHandleA
GlobalSize
CreateEventW
DeleteCriticalSection
CloseHandle
InterlockedExchange
InterlockedCompareExchange
QueryPerformanceCounter
GlobalAlloc
GlobalFree
FlushInstructionCache
GetCurrentProcess
InterlockedIncrement
InterlockedDecrement
lstrlenW
EnterCriticalSection
LeaveCriticalSection
GetLastError
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
GetModuleFileNameW
OutputDebugStringA
GetTickCount
GlobalUnlock
GlobalLock
Sleep
LocalFree
LocalAlloc
MultiByteToWideChar
FindClose
FindFirstFileW
FormatMessageW
CompareStringW
GetCommandLineW
GetFullPathNameW
ExpandEnvironmentStringsW
GetProcessHeap
HeapFree
HeapAlloc
LoadLibraryA
VirtualAlloc
CreateActCtxW
ReleaseActCtx
ActivateActCtx
DeactivateActCtx
VirtualFree
oleaut32
SysStringLen
SysAllocString
SafeArrayGetVartype
VariantClear
VariantInit
VariantChangeType
SafeArrayGetElement
SafeArrayGetUBound
SafeArrayGetLBound
SysAllocStringLen
SafeArrayUnaccessData
SafeArrayAccessData
SysFreeString
SafeArrayGetDim
ole32
CoInitialize
CoUninitialize
ReleaseStgMedium
CoCreateInstance
StringFromCLSID
CoTaskMemFree
CoTaskMemAlloc
CreateStreamOnHGlobal
StringFromGUID2
shlwapi
PathFindFileNameW
PathAddBackslashW
PathRemoveFileSpecW
PathStripPathW
secur32
TranslateNameW
dsuiext
ord10
ntdsapi
DsCrackNamesW
DsFreeNameResultW
activeds
ord13
ord9
Sections
CODE Size: 182KB - Virtual size: 440KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.abss Size: - Virtual size: 472KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.atls Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ