Static task
static1
Behavioral task
behavioral1
Sample
97a6e4d27894f5e28c61ea9c4ae18fe276f816d1c31c26473da166820c1dd82f.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
97a6e4d27894f5e28c61ea9c4ae18fe276f816d1c31c26473da166820c1dd82f.dll
Resource
win10v2004-20221111-en
General
-
Target
97a6e4d27894f5e28c61ea9c4ae18fe276f816d1c31c26473da166820c1dd82f
-
Size
31KB
-
MD5
14d91a230ce14c33b240491bbf71b0e0
-
SHA1
d8bb0fe5cbafe4aa3835b0f2fbbd3bbcf6499bdc
-
SHA256
97a6e4d27894f5e28c61ea9c4ae18fe276f816d1c31c26473da166820c1dd82f
-
SHA512
b6c58f4f15503af3e412dc5fc0425b3122f6b0bd1859859905ffeb06e5eecea9eaa925d7e8e289f22310638cba271ea95a1ea02caf96f4db544fafaa77db9308
-
SSDEEP
768:V5T/5SsWM94CguYIaZXjOy4kK1uqzNN6KxdBR62y:Vp4sW++Iy6y+LKkR6
Malware Config
Signatures
Files
-
97a6e4d27894f5e28c61ea9c4ae18fe276f816d1c31c26473da166820c1dd82f.dll windows x86
8fa47f643c5d590277949e66924e7402
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapAlloc
GetProcessHeap
HeapFree
lstrlenA
CloseHandle
TerminateProcess
ResumeThread
SetThreadContext
VirtualProtectEx
WriteProcessMemory
VirtualAllocEx
ReadProcessMemory
GetThreadContext
CreateProcessA
ExitProcess
GetProcAddress
LoadLibraryA
GetModuleHandleA
WriteFile
CreateFileA
lstrcatA
GetWindowsDirectoryA
GetUserDefaultLCID
ReadFile
ntdll
ZwUnmapViewOfSection
Sections
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 548B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ