hotgjgnudsi
Static task
static1
Behavioral task
behavioral1
Sample
d09ced488be0417b44a3e4aaf1f2c1e9c0b2a97fd52fa528f5c3530d9c9fbd9d.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d09ced488be0417b44a3e4aaf1f2c1e9c0b2a97fd52fa528f5c3530d9c9fbd9d.dll
Resource
win10v2004-20220812-en
General
-
Target
d09ced488be0417b44a3e4aaf1f2c1e9c0b2a97fd52fa528f5c3530d9c9fbd9d
-
Size
432KB
-
MD5
f4f25d4cbedc8ac2d40af380b040e720
-
SHA1
3d5e84e35b9bd1074938d1b632b8c7110a030ec8
-
SHA256
d09ced488be0417b44a3e4aaf1f2c1e9c0b2a97fd52fa528f5c3530d9c9fbd9d
-
SHA512
6c54e3cd50f319baea7deba66baaac0679cfc2319271a1fe1ede51de18d1491f280df9cd660bf7d964dd1a5eedef255c230a4e63f810fd6f541fac5f6c47f4f4
-
SSDEEP
12288:p0Q/uRMQW6VXtPsofXvTHaP+xrCejSL3xA+vGUeb9:p0QWRcqtPsQtxrkL3x3GUE
Malware Config
Signatures
Files
-
d09ced488be0417b44a3e4aaf1f2c1e9c0b2a97fd52fa528f5c3530d9c9fbd9d.dll windows x86
3638346de246d5890c2f7fc9b31aa9aa
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindResourceW
FreeLibrary
FreeResource
GlobalFree
LoadResource
LockResource
Module32First
CompareFileTime
DisableThreadLibraryCalls
ExpandEnvironmentStringsW
GetConsoleAliasExesLengthW
GetCurrentProcess
GetFileAttributesW
GetLogicalDrives
InterlockedDecrement
OutputDebugStringA
SetUnhandledExceptionFilter
Sleep
TerminateProcess
UnhandledExceptionFilter
CancelWaitableTimer
CopyFileA
FindFirstFileExW
FindVolumeMountPointClose
GetCommandLineA
GetDiskFreeSpaceA
GetFileType
GetProcessAffinityMask
GetProfileIntW
GetStartupInfoW
GetSystemInfo
IsBadHugeReadPtr
IsBadHugeWritePtr
LocalReAlloc
PeekNamedPipe
Process32FirstW
QueryDosDeviceA
QueryPerformanceFrequency
SignalObjectAndWait
TerminateJobObject
VerifyVersionInfoW
WaitForDebugEvent
WaitForSingleObject
lstrcmp
CompareStringW
DeleteTimerQueue
FileTimeToSystemTime
FormatMessageW
GetSystemTimeAsFileTime
GetTimeFormatW
InterlockedCompareExchange
InterlockedExchange
SystemTimeToTzSpecificLocalTime
lstrlenW
CloseHandle
CreateDirectoryA
CreateFileA
FormatMessageA
GetCurrentDirectoryA
GetModuleHandleA
GetPrivateProfileIntA
GetPrivateProfileStringA
GetProcAddress
GetProcessHeap
GetSystemDirectoryA
GetVersionExA
GetVolumeInformationA
GetWindowsDirectoryA
LoadLibraryA
LoadLibraryExA
LocalFree
MoveFileA
MultiByteToWideChar
SetCurrentDirectoryA
lstrcmpiA
lstrlenA
DeleteVolumeMountPointW
DeviceIoControl
GetLongPathNameW
HeapCreate
MoveFileExW
OpenJobObjectW
PurgeComm
QueueUserWorkItem
ReadConsoleInputA
WriteProfileSectionA
WriteProfileStringW
_hread
lstrlen
CopyFileW
CreateMutexW
GetCommandLineW
GetDateFormatA
GetModuleHandleW
GetQueuedCompletionStatus
GetStdHandle
LocalAlloc
ReadConsoleW
WideCharToMultiByte
WriteConsoleW
WriteFile
VirtualAlloc
DeleteFileA
GetModuleFileNameA
CreateEventA
GetFileAttributesExW
GetLogicalDriveStringsA
GlobalAlloc
Heap32ListFirst
SetTimerQueueTimer
ExitProcess
GetLastError
GetTimeZoneInformation
HeapFree
HeapAlloc
GetTimeFormatA
HeapValidate
WriteConsoleA
GetCurrentDirectoryW
GetFullPathNameW
RemoveDirectoryW
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
LockFile
UnlockFile
FindClose
FileTimeToLocalFileTime
GetDriveTypeW
FindFirstFileW
GetLocalTime
GetCPInfo
GetStringTypeA
GetStringTypeW
SetConsoleCtrlHandler
ReadConsoleA
SetConsoleMode
GetConsoleMode
DuplicateHandle
FindFirstFileA
FindNextFileA
SetFileTime
LocalFileTimeToFileTime
SystemTimeToFileTime
FindNextFileW
CompareStringA
ExitThread
ResumeThread
CreateThread
SetEnvironmentVariableA
TlsAlloc
SetLastError
GetCurrentThread
TlsFree
TlsSetValue
TlsGetValue
DeleteCriticalSection
FatalAppExitA
SetHandleCount
GetStartupInfoA
SetStdHandle
SetEndOfFile
ReadFile
SetFilePointer
RtlUnwind
HeapDestroy
VirtualFree
HeapReAlloc
IsBadWritePtr
VirtualProtect
VirtualQuery
RaiseException
GetACP
GetOEMCP
LCMapStringA
LCMapStringW
GetDriveTypeA
GetFullPathNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetEnvironmentVariableW
GetLocaleInfoA
HeapSize
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
FlushFileBuffers
InitializeCriticalSection
GetExitCodeProcess
CreateProcessA
GetFileAttributesA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetLocaleInfoW
oleaut32
VarDecFromUI4
VarR8FromBool
VarI1FromR8
VarI2FromI1
VarI4FromDate
VarMod
VarUI4FromBool
LoadRegTypeLi
OleLoadPicture
VarBoolFromI2
GetErrorInfo
LPSAFEARRAY_UserMarshal
VarDateFromI1
VarDateFromR8
VarDecFromI1
VarDecFromI4
VarDecFromR8
VarR4FromStr
VarR8FromCy
VarUI1FromDate
VarUI1FromDec
VariantCopy
VariantTimeToSystemTime
VarBoolFromStr
VarCyFromDate
VarDateFromI2
VarR4FromDate
VarR4FromI2
VarUI2FromI2
user32
DdeQueryNextServer
MessageBoxIndirectA
CreateWindowExW
CallMsgFilter
ChangeMenuA
DdeConnectList
DefWindowProcA
DialogBoxParamW
DispatchMessageW
GetClipCursor
GetMessagePos
GetMessageW
GetNextDlgGroupItem
GetSysColor
GetWindowTextLengthA
InsertMenuW
InvalidateRect
LoadMenuIndirectW
ModifyMenuA
OpenWindowStationW
RealGetWindowClassW
SendIMEMessageExW
SetClipboardViewer
SetLayeredWindowAttributes
SetWindowLongW
SystemParametersInfoA
TabbedTextOutA
mouse_event
wvsprintfA
RegisterWindowMessageW
CharNextA
CharPrevA
CheckMenuRadioItem
LoadStringA
MessageBoxA
MessageBoxExA
OemToCharBuffW
AdjustWindowRect
DefDlgProcA
EnableWindow
FrameRect
GetCapture
GetClassInfoExW
GetWindowPlacement
LoadBitmapA
LoadKeyboardLayoutA
MapVirtualKeyW
OpenClipboard
RegisterClipboardFormatA
SendMessageCallbackW
SetCursor
SetCursorPos
SetWindowPlacement
SetWindowTextA
ToAscii
UnhookWinEvent
WinHelpA
DestroyIcon
EnumDesktopsA
GetClassNameA
GetKeyNameTextW
GetMenuDefaultItem
GetMenuStringA
LoadStringW
RealChildWindowFromPoint
SetWindowLongA
MessageBoxW
AdjustWindowRectEx
CloseClipboard
CreateWindowStationA
EnumDesktopWindows
GetKeyboardState
SetFocus
Exports
Exports
Sections
.text Size: 324KB - Virtual size: 321KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ