Static task
static1
Behavioral task
behavioral1
Sample
afb61baccc1fab03e9c073543201128bad1cbf6f957b0f7f79753e1355469b71.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
afb61baccc1fab03e9c073543201128bad1cbf6f957b0f7f79753e1355469b71.dll
Resource
win10v2004-20221111-en
General
-
Target
afb61baccc1fab03e9c073543201128bad1cbf6f957b0f7f79753e1355469b71
-
Size
64KB
-
MD5
fb04cf3ca18ceaa12b4fac7beeb152d5
-
SHA1
572a77f4c533ac3cf2d02e1627e1a5d499576942
-
SHA256
afb61baccc1fab03e9c073543201128bad1cbf6f957b0f7f79753e1355469b71
-
SHA512
d5e9c158ead2724cb07cc788ffe7d78574ddf9005f0939c751112dcc90339f083d156d199fe3f6e430450f20c11def0e29e363ecaaeb6b3068a08a4e146a1893
-
SSDEEP
1536:PAlG24FKC/w/4d1zc+HzYXnjBRR3IBhA0w51z0P:olG5wYb3YTH9IBhDwTs
Malware Config
Signatures
Files
-
afb61baccc1fab03e9c073543201128bad1cbf6f957b0f7f79753e1355469b71.dll windows x86
1bc9f8d2cd7dd8bf0266d981eaf18732
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
DeleteObject
SelectObject
StretchBlt
DeleteDC
Rectangle
user32
CharLowerW
CharNextW
GetKeyState
GetTopWindow
wsprintfA
wsprintfW
CharUpperW
MessageBoxW
kernel32
GetVersionExA
SetEnvironmentVariableA
CompareStringW
CompareStringA
lstrlenW
HeapAlloc
GetProcessHeap
HeapReAlloc
HeapFree
IsValidLocale
GlobalGetAtomNameW
GlobalDeleteAtom
SystemTimeToTzSpecificLocalTime
RaiseException
InitializeCriticalSectionAndSpinCount
WideCharToMultiByte
GetStringTypeExW
MulDiv
Sleep
GetTickCount
GetCurrentThreadId
LocalAlloc
LocalFree
GetLastError
shell32
ord201
SHGetFolderPathA
oleaut32
CreateErrorInfo
SafeArrayAllocDescriptorEx
SafeArrayGetLBound
SysReAllocStringLen
OleLoadPicture
Sections
.text Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ