mvlhsh
Static task
static1
Behavioral task
behavioral1
Sample
d9d42c3245defd5d82ddaf0a8cc4b0fab18dbc7c76dcfe24a238552138a73fd1.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d9d42c3245defd5d82ddaf0a8cc4b0fab18dbc7c76dcfe24a238552138a73fd1.dll
Resource
win10v2004-20220812-en
General
-
Target
d9d42c3245defd5d82ddaf0a8cc4b0fab18dbc7c76dcfe24a238552138a73fd1
-
Size
448KB
-
MD5
a544e1b2b3a65bbbeb38e7567cb27e60
-
SHA1
da64b7951974a31db66de610290da6cf8267151d
-
SHA256
d9d42c3245defd5d82ddaf0a8cc4b0fab18dbc7c76dcfe24a238552138a73fd1
-
SHA512
71579fc2166f7c03e646c3043fef4d989a813651fce336fb556f89ce1bfa13e6448a49cb6bf433aa6b853fbd6dff0cbff5697aa0a2231d24afebb0c5565af710
-
SSDEEP
12288:eSGPWx17vsBnfwG9MOcdixlbUUbPU7ZKKKpcDz:ePU1TifwGqKYUb87Zyps
Malware Config
Signatures
Files
-
d9d42c3245defd5d82ddaf0a8cc4b0fab18dbc7c76dcfe24a238552138a73fd1.dll windows x86
16590b5338c592be72f8cf5e9e2a079c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
BitBlt
CreateBitmap
CreateCompatibleDC
CreateSolidBrush
DeleteDC
DeleteObject
GetBitmapBits
GetObjectW
GetTextExtentPointW
SelectObject
SetBkMode
SetStretchBltMode
SetTextColor
StretchBlt
TextOutW
CreatePen
GetPaletteEntries
PathToRegion
Rectangle
CreateEnhMetaFileW
GetBkMode
GetCharWidthA
GetEnhMetaFileDescriptionA
GetEnhMetaFilePaletteEntries
PlgBlt
PolyTextOutW
RemoveFontResourceA
ScaleViewportExtEx
SetSystemPaletteUse
SetTextJustification
PlayEnhMetaFile
GdiPlayEMF
GdiPlayPrivatePageEMF
SetRectRgn
AnimatePalette
SwapBuffers
CreateFontIndirectExW
GdiPlayPageEMF
SetICMProfileW
kernel32
GetCurrentProcess
GetCurrentThreadId
GetModuleHandleW
GetProcAddress
LoadLibraryW
LocalAlloc
LocalFree
ReleaseMutex
SetUnhandledExceptionFilter
TerminateProcess
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
WaitForSingleObject
lstrlenW
GetProcessHeap
GlobalGetAtomNameW
InterlockedIncrement
ConvertThreadToFiber
CreateIoCompletionPort
EnumSystemLocalesA
ExpungeConsoleCommandHistoryW
FoldStringW
GetCommTimeouts
GetCurrencyFormatA
GetDateFormatW
GetDiskFreeSpaceA
GetDiskFreeSpaceExW
GetFileType
GetNumberOfConsoleMouseButtons
GetProcessPriorityBoost
GetProcessTimes
GetTempPathA
HeapLock
IsBadCodePtr
OpenJobObjectW
OpenProfileUserMapping
QueryDosDeviceW
SearchPathW
SetThreadContext
SetTimerQueueTimer
VirtualAllocEx
VirtualProtect
WriteConsoleA
WriteConsoleInputW
WriteProfileStringA
_lopen
GetCurrentProcessId
GetLocalTime
GetTickCount
GlobalAlloc
GlobalFree
InterlockedDecrement
SetEvent
Sleep
VirtualAlloc
VirtualFree
CallNamedPipeW
CloseHandle
CopyFileW
CreateDirectoryW
CreateFileW
CreateProcessW
GetSystemDirectoryW
GetSystemTimeAsFileTime
InterlockedCompareExchange
InterlockedExchange
QueryPerformanceCounter
QueueUserWorkItem
GetStartupInfoW
FindResourceW
FreeLibrary
GetModuleFileNameW
LoadLibraryExW
LoadResource
MultiByteToWideChar
OutputDebugStringA
RaiseException
SizeofResource
lstrcmpiW
CreateEventW
DeviceIoControl
GetCurrentThread
GetOverlappedResult
GetPrivateProfileStringW
LocalHandle
SetConsoleInputExeNameA
SetCurrentDirectoryA
AssignProcessToJobObject
CreateDirectoryA
CreateEventA
CreateFileA
CreateFileMappingA
CreateMutexA
CreateThread
ExpandEnvironmentStringsA
GetPrivateProfileIntA
GetSystemPowerStatus
GetWindowsDirectoryA
HeapDestroy
MapViewOfFile
SetCommTimeouts
SetThreadPriority
SuspendThread
UnmapViewOfFile
WaitForMultipleObjects
FindResourceA
WideCharToMultiByte
LCMapStringA
LCMapStringW
HeapFree
HeapAlloc
ExitProcess
GetLastError
GetExitCodeProcess
ReadConsoleInputA
SetConsoleMode
GetConsoleMode
PeekConsoleInputA
GetNumberOfConsoleInputEvents
DuplicateHandle
GetFullPathNameA
DeleteFileA
SetFileAttributesW
GetFileAttributesW
DeleteFileW
GetCommandLineA
GetVersion
IsBadReadPtr
SetHandleCount
GetStdHandle
GetStartupInfoA
DeleteCriticalSection
CreatePipe
SetFileTime
LocalFileTimeToFileTime
SystemTimeToFileTime
HeapReAlloc
FileTimeToSystemTime
FileTimeToLocalFileTime
GetFileInformationByHandle
PeekNamedPipe
SetFilePointer
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
GetStringTypeA
GetStringTypeW
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
FatalAppExitA
GetModuleHandleA
GetModuleFileNameA
GetEnvironmentVariableA
GetVersionExA
HeapCreate
IsBadWritePtr
TlsAlloc
TlsFree
SetLastError
ReadFile
HeapSize
CompareStringA
CompareStringW
SetStdHandle
GetCurrentDirectoryA
GetDriveTypeA
FlushFileBuffers
WriteFile
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetTimeZoneInformation
GetSystemTime
IsValidLocale
IsValidCodePage
GetLocaleInfoA
GetUserDefaultLCID
SetConsoleCtrlHandler
LoadLibraryA
SetEnvironmentVariableW
GetFileAttributesA
CreateProcessA
SetEndOfFile
GetLocaleInfoW
SetEnvironmentVariableA
ole32
CoTreatAsClass
StgCreateStorageEx
OleQueryCreateFromData
IIDFromString
OleFlushClipboard
CoUninitialize
CoTaskMemRealloc
CoTaskMemFree
CoResumeClassObjects
CoInitializeEx
OleCreateStaticFromData
CoRegisterClassObject
WriteClassStg
StgCreateDocfile
OleGetAutoConvert
OleCreateFromDataEx
HkOleRegisterObject
CoSetProxyBlanket
CoCreateInstance
rpcrt4
NdrConformantVaryingStructFree
RpcMgmtIsServerListening
NdrFixedArrayUnmarshall
NdrXmitOrRepAsUnmarshall
RpcStringFreeW
RpcStringFreeA
RpcStringBindingParseW
RpcStringBindingComposeA
RpcRevertToSelf
RpcRaiseException
RpcBindingFromStringBindingW
RpcBindingFromStringBindingA
RpcBindingFree
NdrClientCall2
I_RpcNsBindingSetEntryNameW
I_RpcGetBuffer
I_RpcFree
I_RpcAllocate
data_from_ndr
MesInqProcEncodingId
NdrMesSimpleTypeEncode
CStdStubBuffer_Disconnect
I_RpcClearMutex
I_RpcTransDatagramFree
NdrComplexStructUnmarshall
NdrConformantArrayMarshall
NdrConformantArrayMemorySize
NdrCorrelationInitialize
NdrInterfacePointerUnmarshall
RpcBindingInqAuthClientW
RpcSsSetClientAllocFree
NdrVaryingArrayFree
NdrConformantVaryingStructUnmarshall
RpcBindingToStringBindingW
RpcServerUseProtseqExA
NdrClientInitializeNew
NdrDllGetClassObject
NdrSimpleStructUnmarshall
NdrProxySendReceive
UuidHash
shell32
StrChrA
SHGetDiskFreeSpaceA
DragQueryFileW
user32
GetKeyNameTextA
GetMenuCheckMarkDimensions
GetNextDlgGroupItem
IsWindow
ScrollChildren
SetWindowsHookExA
TileWindows
ToUnicode
TranslateAccelerator
UnregisterDeviceNotification
LoadAcceleratorsW
SetPropA
GetKeyboardType
CharNextW
OpenDesktopW
PostMessageA
wsprintfA
wvsprintfA
SetScrollRange
DestroyWindow
CallWindowProcW
CheckDlgButton
CheckRadioButton
CopyImage
CreateIconIndirect
DestroyIcon
DrawFocusRect
EnableWindow
FillRect
GetDC
GetDlgItem
GetFocus
GetIconInfo
GetParent
GetPropW
GetSysColor
GetSystemMetrics
GetWindowLongW
GetWindowRect
GetWindowTextW
LoadCursorW
LoadImageW
MapWindowPoints
PostMessageW
ReleaseDC
RemovePropW
SendMessageW
SetCursor
SetFocus
SetPropW
SetWindowContextHelpId
SetWindowLongW
SetWindowPos
SetWindowTextW
ShowWindow
WinHelpW
DestroyAcceleratorTable
FindWindowExW
InflateRect
InvalidateRect
IsChild
IsRectEmpty
LoadStringW
OffsetRect
RealGetWindowClassA
ReleaseCapture
SetMenuItemInfoA
SetRect
UnionRect
UnregisterClassW
ClientToScreen
CloseWindowStation
DdeQueryConvInfo
DefFrameProcA
DefFrameProcW
DlgDirSelectComboBoxExW
GetDlgItemTextA
Exports
Exports
Sections
.text Size: 340KB - Virtual size: 339KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 68KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ