Static task
static1
Behavioral task
behavioral1
Sample
61963f7f15efd7a7418ba1cda06d6c1304815295db749d9ffb296066a588464a.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
61963f7f15efd7a7418ba1cda06d6c1304815295db749d9ffb296066a588464a.dll
Resource
win10v2004-20221111-en
General
-
Target
61963f7f15efd7a7418ba1cda06d6c1304815295db749d9ffb296066a588464a
-
Size
848KB
-
MD5
add8afe2089be847398157237db19860
-
SHA1
2b82912abde83fef442c979747ee42bc3fcd7b5b
-
SHA256
61963f7f15efd7a7418ba1cda06d6c1304815295db749d9ffb296066a588464a
-
SHA512
0b1bb16159fa17c1f8df5750402c32aabf8d798a4010a22d7e0b3f8efc61ae4029dca0bbf9422948197c458b5c6a74ba14aebeb07bf68f8bbe014a45f66fa034
-
SSDEEP
24576:fVnGOU55c65l9rlSZuY8fzXFx0jbbC5S0i3wrRK/APCE9:NnGN5LzPqYx0jXC5ROf4PT
Malware Config
Signatures
Files
-
61963f7f15efd7a7418ba1cda06d6c1304815295db749d9ffb296066a588464a.dll windows x86
50237c4fbaccdca087d8e717e943479c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetEndOfFile
HeapCreate
GlobalLock
RaiseException
ConvertDefaultLocale
MulDiv
HeapReAlloc
TlsAlloc
UnhandledExceptionFilter
LocalAlloc
LocalFileTimeToFileTime
RtlUnwind
SetHandleCount
VirtualQuery
GetVersionExA
GetVersion
InitializeCriticalSection
LCMapStringA
SetEnvironmentVariableA
GetCurrentProcessId
FreeResource
GetFileSize
CloseHandle
GetACP
HeapSize
HeapDestroy
GetCurrentThread
QueryPerformanceCounter
GetConsoleOutputCP
lstrcmpA
SizeofResource
TerminateProcess
SystemTimeToFileTime
InterlockedIncrement
FileTimeToLocalFileTime
GetStdHandle
WriteConsoleA
TlsGetValue
GetProcessHeap
GetThreadLocale
FileTimeToSystemTime
GetCommandLineW
FreeLibrary
GetCommandLineA
GetStartupInfoA
GetWindowsDirectoryA
GetTimeZoneInformation
TlsSetValue
CreateFileA
GetConsoleMode
WriteFile
HeapAlloc
GetSystemInfo
GetSystemTimeAsFileTime
GlobalFlags
ReadFile
FlushFileBuffers
GlobalAlloc
GetSystemDirectoryA
GetLocaleInfoA
LeaveCriticalSection
LockFile
LoadResource
EnumResourceLanguagesW
SetErrorMode
GetEnvironmentStrings
GlobalReAlloc
GlobalFree
TlsFree
VirtualAlloc
HeapFree
GetFileType
SetUnhandledExceptionFilter
LocalReAlloc
FindClose
DeleteCriticalSection
GetConsoleCP
InterlockedExchange
FreeEnvironmentStringsA
DuplicateHandle
LockResource
IsDebuggerPresent
VirtualFree
LocalFree
Sleep
SetLastError
GlobalDeleteAtom
SetFilePointer
GetModuleFileNameA
EnterCriticalSection
InterlockedDecrement
GlobalUnlock
GetLastError
GlobalHandle
GetStringTypeA
SetStdHandle
UnlockFile
CompareStringA
GetFileTime
lstrlenA
GetOEMCP
lstrcpyA
GetCurrentThreadId
LoadLibraryExA
GetModuleHandleA
AddAtomA
LoadLibraryA
GetProcAddress
lstrcatA
SetFileTime
ExitProcess
user32
GetForegroundWindow
GetLastActivePopup
GetWindowRgn
GetMessagePos
UnpackDDElParam
TranslateMessage
GetWindow
SetFocus
ReuseDDElParam
GetMenu
PostQuitMessage
GetDlgItem
ShowWindow
EndDialog
CopyRect
GetMenuState
IsZoomed
CheckMenuItem
IntersectRect
IsIconic
GetFocus
RedrawWindow
GetSubMenu
IsRectEmpty
GetCursorPos
GetMenuCheckMarkDimensions
SetWindowPos
GetClientRect
GetSystemMenu
ScreenToClient
GetWindowPlacement
DrawIcon
MapDialogRect
ClientToScreen
UpdateWindow
TrackPopupMenu
SetRect
InvalidateRect
GetCapture
GetWindowThreadProcessId
ShowOwnedPopups
BeginPaint
CreatePopupMenu
GetTopWindow
SetActiveWindow
SetCursor
GetActiveWindow
DestroyMenu
SetRectEmpty
ReleaseCapture
IsChild
LockWindowUpdate
GetDCEx
SetScrollInfo
IsWindow
EqualRect
CallNextHookEx
GetDesktopWindow
SystemParametersInfoA
SetMenuItemBitmaps
GetMenuItemCount
SetScrollRange
DeleteMenu
DestroyWindow
GetDlgCtrlID
ScrollWindow
SetWindowRgn
AdjustWindowRectEx
SetScrollPos
DeferWindowPos
WindowFromPoint
GetNextDlgTabItem
GetNextDlgGroupItem
GetKeyState
SetMenu
SetCapture
GetScrollPos
DestroyIcon
GetWindowRect
SetParent
GetDC
SendDlgItemMessageA
MapWindowPoints
GetWindowDC
GetSysColorBrush
FillRect
IsWindowEnabled
SetWindowContextHelpId
MessageBeep
PtInRect
GetParent
ReleaseDC
GetScrollRange
GetScrollInfo
EnableMenuItem
SetTimer
GetMessageTime
ValidateRect
GetMenuItemID
UnregisterClassA
InflateRect
BringWindowToTop
EndDeferWindowPos
ShowScrollBar
SetForegroundWindow
MoveWindow
InvalidateRgn
OffsetRect
IsWindowVisible
EndPaint
GetSysColor
UnhookWindowsHookEx
BeginDeferWindowPos
GetSystemMetrics
CharLowerA
KillTimer
gdi32
SetMapMode
CreateCompatibleDC
ScaleWindowExtEx
Ellipse
GetTextColor
GetBkColor
GetClipBox
GetStockObject
PtVisible
ExcludeClipRect
SetTextColor
GetMapMode
OffsetViewportOrgEx
CreateBitmap
DeleteDC
SaveDC
SetWindowExtEx
DPtoLP
SelectClipRgn
CreateSolidBrush
DeleteObject
RectVisible
SetBkMode
GetPixel
GetDeviceCaps
RestoreDC
CreateRectRgnIndirect
SetViewportOrgEx
OffsetRgn
StretchDIBits
SetViewportExtEx
SelectObject
ExtSelectClipRgn
GetRgnBox
CreateRectRgn
IntersectClipRect
BitBlt
Escape
CreatePatternBrush
PatBlt
SetRectRgn
ScaleViewportExtEx
SetBkColor
CombineRgn
CreateEllipticRgn
GetWindowExtEx
CreateCompatibleBitmap
advapi32
RegCloseKey
SetFileSecurityW
ole32
OleFlushClipboard
CreateILockBytesOnHGlobal
CoGetClassObject
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoFreeUnusedLibraries
OleIsCurrentClipboard
OleInitialize
CoRevokeClassObject
CoCreateInstance
OleUninitialize
CLSIDFromString
CLSIDFromProgID
oleaut32
SysAllocString
VariantClear
VariantChangeType
VariantCopy
SafeArrayDestroy
VariantInit
SysFreeString
SysAllocStringLen
OleCreateFontIndirect
VariantTimeToSystemTime
OleLoadPicture
SystemTimeToVariantTime
SysStringLen
comctl32
ImageList_LoadImageW
shlwapi
PathFindExtensionW
PathRemoveExtensionW
PathFileExistsW
PathFindFileNameW
PathIsUNCW
PathStripToRootW
snmpapi
SnmpUtilMemAlloc
Sections
.text Size: 554KB - Virtual size: 553KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 264KB - Virtual size: 285KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ