WdcfgPath
Static task
static1
Behavioral task
behavioral1
Sample
d15e56d159cb80ea7c8e846bac9ad04c2b8fd4339147034783857db808e43b2a.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d15e56d159cb80ea7c8e846bac9ad04c2b8fd4339147034783857db808e43b2a.dll
Resource
win10v2004-20220812-en
General
-
Target
d15e56d159cb80ea7c8e846bac9ad04c2b8fd4339147034783857db808e43b2a
-
Size
88KB
-
MD5
4f9f292f0d3df675ae7e80ddc24457ed
-
SHA1
de0ae989ece900f9a11fc4b28739de03e1ea2f16
-
SHA256
d15e56d159cb80ea7c8e846bac9ad04c2b8fd4339147034783857db808e43b2a
-
SHA512
16966d2199b4980ce163f454f9d3279774e5f56217fd8218b849285b65a6dfbb6c9a7871fe23d61162fbe7b69cff59688f4fe05e7915075353bb1d10fbf695d0
-
SSDEEP
1536:3kM+Of2sdTomp+Jk+jJGASVUTKc8W+7Qx4LTjHakwAzMSh:3kM+OnTo2+XJGLUTKzsCL3MS
Malware Config
Signatures
Files
-
d15e56d159cb80ea7c8e846bac9ad04c2b8fd4339147034783857db808e43b2a.dll windows x86
eac9732a1e54d94a1de6c5daafe65e55
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OpenEventA
LocalSize
LoadLibraryA
FindFirstFileExW
IsBadHugeReadPtr
MapViewOfFileEx
CreateMutexW
CancelIo
GetProcAddress
advapi32
ImpersonateSelf
shell32
SHGetSpecialFolderPathW
gdi32
CreateEnhMetaFileA
GetTextFaceW
SwapBuffers
SetDIBits
Ellipse
ExtCreateRegion
Exports
Exports
Sections
.text Size: 68KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 684B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ