Static task
static1
Behavioral task
behavioral1
Sample
e100cf299d3c7024dd27f288fbfe263194ece69c7bea62cbb03fbd691ef34692.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e100cf299d3c7024dd27f288fbfe263194ece69c7bea62cbb03fbd691ef34692.dll
Resource
win10v2004-20221111-en
General
-
Target
e100cf299d3c7024dd27f288fbfe263194ece69c7bea62cbb03fbd691ef34692
-
Size
174KB
-
MD5
cb2db644cb96df999f7788d3cf0a845b
-
SHA1
6ad1773c681d127b429db2088e6343a667979cf6
-
SHA256
e100cf299d3c7024dd27f288fbfe263194ece69c7bea62cbb03fbd691ef34692
-
SHA512
594736fa6306e4d11a75cdf489ba16ca64687a703c86e3687d352ed733f0439136e0d53efd97a819e6715ff42e4e4b8a430dbdb3a516688e158f2dd8405bc3bd
-
SSDEEP
3072:YEQdpBKGalqNVq5LQxJybL95BfCkHJp81dazQFBm94RYP+JQ0DA:Id2Gal+VCuJkLBakpp81U4RYPj
Malware Config
Signatures
Files
-
e100cf299d3c7024dd27f288fbfe263194ece69c7bea62cbb03fbd691ef34692.dll windows x86
80d6597cb462c3d52c6f607ef74578c7
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
GetVersionExW
GetExitCodeThread
LeaveCriticalSection
EnterCriticalSection
GetModuleHandleW
ResumeThread
GetCurrentThreadId
GetSystemTimeAsFileTime
GetTickCount
SetThreadPriority
CreateFileW
GetPrivateProfileStringW
GetFileAttributesW
GetModuleFileNameW
SuspendThread
WaitForMultipleObjects
CreateEventW
FindNextFileW
OutputDebugStringW
DeleteFileW
CreateDirectoryW
TerminateProcess
MultiByteToWideChar
ole32
CoDeactivateObject
CoUninitialize
advapi32
RegQueryValueExA
RegOpenKeyExA
LsaGetSystemAccessAccount
RegSetValueExA
RegCreateKeyExA
RegCloseKey
Sections
.text Size: 90KB - Virtual size: 89KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 1008B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 82KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ