Static task
static1
Behavioral task
behavioral1
Sample
528c2411a78ebcd1c989d51bc3686940496f05ba936b0bbc528fd754c911fcaf.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
528c2411a78ebcd1c989d51bc3686940496f05ba936b0bbc528fd754c911fcaf.dll
Resource
win10v2004-20220901-en
General
-
Target
528c2411a78ebcd1c989d51bc3686940496f05ba936b0bbc528fd754c911fcaf
-
Size
177KB
-
MD5
bbe523cbf6a11f8d7f721abf85686bc1
-
SHA1
e41c4367bc8c60869a082d6dc7d2a5cfe94282b6
-
SHA256
528c2411a78ebcd1c989d51bc3686940496f05ba936b0bbc528fd754c911fcaf
-
SHA512
f1214610188772cd5bb9e49dd4409e4fefb70bcdeeac9eff492c5c12077a5cd7ad566b8fd5cf093327f3016a4d6d7b9a9f5d1c1730518dda620bdc1e714f2e43
-
SSDEEP
3072:RFzRfuBxEh+bOisVvSXfrprZcSz7lXlakuo0sEtCMuR:RFzRGBxEUOxvSXzFZBP5lfl
Malware Config
Signatures
Files
-
528c2411a78ebcd1c989d51bc3686940496f05ba936b0bbc528fd754c911fcaf.dll windows x86
d32e5df88b517bd07ed7a9fcbf960da0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVolumeInformationW
GetVolumeNameForVolumeMountPointW
GetVolumePathNameW
GetWindowsDirectoryW
GlobalFree
HeapAlloc
HeapFree
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
LoadLibraryW
LoadResource
LocalFileTimeToFileTime
LocalFree
LockFile
LockResource
MoveFileExW
MultiByteToWideChar
PrepareTape
QueryPerformanceCounter
ReadFile
ReleaseMutex
ReleaseSemaphore
RemoveDirectoryW
SetCurrentDirectoryW
GetVersionExW
SetErrorMode
SetEvent
SetFileAttributesW
SetFilePointer
SetFileShortNameW
SetFileTime
SetLastError
SetTapeParameters
SetTapePosition
SetUnhandledExceptionFilter
Sleep
SystemTimeToFileTime
SystemTimeToTzSpecificLocalTime
TerminateProcess
TerminateThread
UnhandledExceptionFilter
VerSetConditionMask
VerifyVersionInfoW
WaitForSingleObject
WideCharToMultiByte
WriteFile
WritePrivateProfileStringW
WriteTapemark
VirtualAlloc
GetUserDefaultLCID
GetTimeZoneInformation
GetTimeFormatW
GetTickCount
GetTapeStatus
GetTapePosition
GetTapeParameters
GetSystemTimeAsFileTime
GetSystemTime
GetSystemDirectoryW
GetStartupInfoW
BackupRead
GetProcessHeap
GetProcAddress
GetPrivateProfileStringW
GetNumberFormatW
GetModuleHandleA
GetModuleFileNameW
GetLogicalDriveStringsW
GetLocaleInfoW
GetLocalTime
GetLastError
GetFileSize
GetFileInformationByHandle
GetFileAttributesW
GetExitCodeThread
GetEnvironmentVariableW
GetDriveTypeW
GetDiskFreeSpaceExW
GetDateFormatW
GetCurrentThreadId
GetCurrentThread
GetCurrentProcessId
GetCurrentProcess
GetCurrentDirectoryW
GetCurrentDirectoryA
GetComputerNameW
GetCompressedFileSizeW
FreeLibrary
FormatMessageW
FlushFileBuffers
FindVolumeMountPointClose
FindResourceW
FindNextVolumeMountPointW
FindNextFileW
FindFirstVolumeMountPointW
FindFirstFileW
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
ExpandEnvironmentStringsW
ExitThread
EraseTape
EnterCriticalSection
DeviceIoControl
DeleteFileW
DeleteCriticalSection
CreateThread
CreateSemaphoreW
CreateProcessW
CreateMutexW
CreateHardLinkW
CreateFileW
CreateEventW
CreateDirectoryW
CompareStringW
CloseHandle
BackupWrite
BackupSeek
SetEndOfFile
gdi32
SelectObject
Rectangle
Polygon
GetTextExtentPoint32W
GetObjectW
GetMapMode
DeleteObject
CreateRectRgn
CreateFontIndirectW
CreateCompatibleDC
CreateCompatibleBitmap
CreateBitmap
CombineRgn
BitBlt
PatBlt
advapi32
WriteEncryptedFileRaw
StartServiceW
SetSecurityDescriptorDacl
SetFileSecurityW
SetEntriesInAclW
ReportEventW
RegisterEventSourceW
RegUnLoadKeyW
RegSetValueExW
RegSaveKeyW
RegRestoreKeyW
RegReplaceKeyW
RegQueryValueExW
RegQueryValueExA
RegOpenKeyW
RegOpenKeyExW
RegOpenKeyExA
RegLoadKeyW
RegFlushKey
RegEnumValueW
RegEnumKeyExW
RegDeleteValueW
RegCreateKeyExW
RegConnectRegistryW
RegCloseKey
ReadEncryptedFileRaw
QueryServiceStatus
OpenThreadToken
OpenServiceW
OpenSCManagerW
OpenProcessToken
OpenEncryptedFileRawW
LookupPrivilegeValueW
LookupAccountSidW
InitializeSecurityDescriptor
InitializeAcl
GetUserNameW
GetTokenInformation
GetSecurityDescriptorDacl
GetAce
FreeSid
EqualSid
EnumDependentServicesW
EncryptFileW
DeleteAce
DecryptFileW
ControlService
CloseServiceHandle
CloseEncryptedFileRaw
CheckTokenMembership
AllocateAndInitializeSid
AdjustTokenPrivileges
AddAccessAllowedAce
msvcrt
_CxxThrowException
_XcptFilter
__CxxFrameHandler
__dllonexit
__p__commode
__p__fmode
__set_app_type
__setusermatherr
__wgetmainargs
_adjust_fdiv
_c_exit
_cexit
_controlfp
_errno
_except_handler3
_exit
_fdopen
_filelength
_ftol
_getpid
_initterm
_local_unwind2
_mbscpy
_mbslen
_onexit
_open_osfhandle
_purecall
_putenv
_snwprintf
_tzset
_vsnwprintf
_wcmdln
_wcsdup
_wcsicmp
_wcslwr
_wcsnicmp
_wcsrev
_wcsupr
_wfopen
_wtoi
calloc
clearerr
exit
fclose
fflush
fread
free
fseek
ftell
fwrite
isalpha
isspace
localtime
malloc
memmove
mktime
realloc
swprintf
swscanf
time
wcscat
wcschr
wcscmp
wcscpy
wcslen
wcsncat
wcsncmp
wcsncpy
wcspbrk
wcsrchr
wcsstr
wcstok
wprintf
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 138KB - Virtual size: 138KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata2 Size: 512B - Virtual size: 500B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data2 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ