Static task
static1
Behavioral task
behavioral1
Sample
9993146333673dd7cedf9a98e9e7f85996e22577a1de4d651434f01eb28c42c1.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9993146333673dd7cedf9a98e9e7f85996e22577a1de4d651434f01eb28c42c1.dll
Resource
win10v2004-20220812-en
General
-
Target
9993146333673dd7cedf9a98e9e7f85996e22577a1de4d651434f01eb28c42c1
-
Size
138KB
-
MD5
f5ed5b98b7ade69c2ec3af6c5f8cbc90
-
SHA1
ce3e6fda10da0a6ece1e79364e65f58a1ba2ab89
-
SHA256
9993146333673dd7cedf9a98e9e7f85996e22577a1de4d651434f01eb28c42c1
-
SHA512
a7ba9911727da7387efb1cc9d49bfd1aea42660ae4003cea55ad49ae64280c494d472fd9a054aa119daa8697b84ccad56e1b43dfe0a6b0e8a0147c127e7e568f
-
SSDEEP
3072:Prj1Hh/FCn6+7uHJ+yLvgMy/qQ4bi5aZoukfkV:PFHXC6T+AvE/qnbi7uKe
Malware Config
Signatures
Files
-
9993146333673dd7cedf9a98e9e7f85996e22577a1de4d651434f01eb28c42c1.dll windows x86
981a35a4e1f00f51116a07d8e334f33e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadConsoleOutputAttribute
GetFileAttributesExA
GetDiskFreeSpaceA
GetProcessId
GetTempPathA
LocalReAlloc
VirtualFree
IsProcessorFeaturePresent
ReadConsoleOutputCharacterA
FindVolumeClose
GetLogicalDrives
EnumSystemLanguageGroupsA
AddConsoleAliasA
Process32Next
GetProcessIoCounters
_lread
GlobalCompact
FindFirstFileExW
FlushFileBuffers
GetConsoleOutputCP
GetAtomNameA
GetFileAttributesExA
GetConsoleCursorInfo
GetConsoleMode
EndUpdateResourceA
SetComputerNameExW
SetThreadLocale
SetConsoleActiveScreenBuffer
SetupComm
SetConsoleCtrlHandler
WriteConsoleOutputCharacterW
BeginUpdateResourceA
TransmitCommChar
GetVolumePathNamesForVolumeNameA
SetHandleInformation
GetSystemTime
GetThreadSelectorEntry
IsBadWritePtr
CreateNamedPipeA
FillConsoleOutputCharacterA
GetSystemTimeAsFileTime
SetComputerNameA
WriteConsoleOutputCharacterA
VirtualAllocEx
GetThreadPriorityBoost
Heap32Next
GetCommModemStatus
GetProfileIntA
SetDllDirectoryA
GetDefaultCommConfigA
GetConsoleInputWaitHandle
GetCurrentDirectoryA
GetDllDirectoryA
UnlockFileEx
SetVolumeLabelA
SetConsoleCP
GetConsoleMode
GetLocaleInfoA
LocalLock
PulseEvent
GetProcessWorkingSetSize
Thread32First
GetConsoleWindow
SetCommBreak
GetFileAttributesA
GlobalFix
GetWindowsDirectoryA
GetVolumePathNameA
GetCommandLineA
SetEvent
PeekConsoleInputA
SetLocaleInfoA
GetCommandLineA
GetThreadLocale
GetPrivateProfileSectionNamesA
GetStartupInfoA
GetLogicalDrives
GetProcessVersion
SetHandleInformation
RaiseException
lstrcpy
DisconnectNamedPipe
OpenJobObjectA
SetInformationJobObject
MapViewOfFileEx
_llseek
SetCommTimeouts
GetDefaultCommConfigA
PeekConsoleInputA
LZClose
ExitThread
OpenJobObjectA
GetFileInformationByHandle
SleepEx
WriteConsoleOutputA
SetConsoleIcon
HeapCompact
SetCommMask
GetDiskFreeSpaceA
ClearCommBreak
GetPrivateProfileSectionA
CreateWaitableTimerA
GetDiskFreeSpaceExA
GlobalHandle
GetCommState
OpenFileMappingA
IsBadCodePtr
GetVersion
EnumResourceLanguagesA
GetEnvironmentStringsA
GetThreadLocale
WriteConsoleOutputAttribute
GetProcessVersion
GetConsoleTitleA
GetUserDefaultLangID
HeapCreate
GetProcessShutdownParameters
VerifyVersionInfoW
GetCurrentProcessId
UnregisterWaitEx
LCMapStringA
GlobalSize
GetCommandLineA
MoveFileWithProgressA
GetTapePosition
PostQueuedCompletionStatus
OpenJobObjectA
VerifyVersionInfoA
GetProcessShutdownParameters
GetConsoleTitleA
DeleteFileA
SetFileAttributesA
UnregisterWait
SetComputerNameA
WaitForMultipleObjects
GetLastError
advapi32
EncryptionDisable
user32
SwitchToThisWindow
EmptyClipboard
SetTaskmanWindow
InsertMenuItemW
InSendMessage
GetPropA
GetClassLongA
CharLowerBuffA
RegisterClipboardFormatA
CharToOemBuffW
ChangeMenuA
CopyRect
IsClipboardFormatAvailable
SetClipboardData
ChangeClipboardChain
SetSystemCursor
CreateIcon
OpenClipboard
ScrollWindow
RegisterServicesProcess
EnumPropsExA
MessageBoxA
SetWindowTextA
EnumWindowStationsA
CreateDialogIndirectParamA
SetPropA
RegisterSystemThread
ChildWindowFromPointEx
RemoveMenu
ActivateKeyboardLayout
CopyRect
CreateIconFromResourceEx
LockWindowUpdate
GetMessageTime
EnumDisplaySettingsExA
SetCaretPos
PeekMessageA
LoadMenuIndirectA
UnregisterUserApiHook
GetMenuItemInfoA
IsHungAppWindow
MessageBoxIndirectA
InvertRect
RegisterLogonProcess
AppendMenuA
CopyAcceleratorTableA
GetUpdateRect
GetMenuDefaultItem
EnumThreadWindows
UnregisterUserApiHook
DrawCaptionTempA
InSendMessage
DrawFocusRect
ChangeDisplaySettingsExW
GetMonitorInfoA
DispatchMessageA
IsCharUpperA
SetMenu
GetDC
CallWindowProcA
DestroyCaret
RegisterDeviceNotificationA
GetPropA
LockWindowStation
EnumDesktopWindows
SendMessageTimeoutA
EnumChildWindows
DragObject
RealGetWindowClass
BroadcastSystemMessageExA
GetOpenClipboardWindow
GetWindowWord
GetMenuItemID
AnimateWindow
LoadBitmapA
UnionRect
GetKeyboardState
SetScrollPos
DialogBoxIndirectParamAorW
SendNotifyMessageA
DialogBoxIndirectParamAorW
DestroyWindow
UnpackDDElParam
CallWindowProcA
CallWindowProcA
LockWorkStation
IsWindowUnicode
SetMenuItemInfoA
CreateIconFromResourceEx
DlgDirSelectComboBoxExA
HiliteMenuItem
SetWindowTextA
DefFrameProcA
GetForegroundWindow
GetPriorityClipboardFormat
IsCharUpperA
CharUpperA
SetWindowPos
BeginDeferWindowPos
TileChildWindows
SetMenuItemBitmaps
GetKeyNameTextA
GetMenuInfo
SetProcessWindowStation
RegisterClipboardFormatA
RemoveMenu
SetCapture
CallNextHookEx
GetReasonTitleFromReasonCode
InternalGetWindowText
GetMenuDefaultItem
GetForegroundWindow
NotifyWinEvent
GetDlgItemTextA
DeleteMenu
LockWindowStation
DlgDirSelectComboBoxExA
DrawCaptionTempA
UnhookWinEvent
DlgDirListComboBoxW
SetProcessDefaultLayout
PrivateExtractIconsA
CallNextHookEx
ImpersonateDdeClientWindow
SetDebugErrorLevel
BroadcastSystemMessageExA
CreateIconIndirect
opengl32
glRasterPos2i
d3d8
Direct3DCreate8
Sections
.text Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 80B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 117KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE