?TryEnterCriticalSectionJKDJHLJHKDljfjhl@@YGKEPA_WG@Z
Static task
static1
Behavioral task
behavioral1
Sample
239179ba04c6c3bbe2d2f1d8f09df5dba31dcb768e19287527112c115f4c7165.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
239179ba04c6c3bbe2d2f1d8f09df5dba31dcb768e19287527112c115f4c7165.dll
Resource
win10v2004-20221111-en
General
-
Target
239179ba04c6c3bbe2d2f1d8f09df5dba31dcb768e19287527112c115f4c7165
-
Size
211KB
-
MD5
59959d42080b635fa1c869f39f6e0220
-
SHA1
13d2486a5e8c18e69135272e876b1d1a4a135fa6
-
SHA256
239179ba04c6c3bbe2d2f1d8f09df5dba31dcb768e19287527112c115f4c7165
-
SHA512
8a690baf21f8a58e0f1534ea818224759a2a8cb18b9c5a7b7428b94b67eb2a72022f2da217332a6ef8068fa3d04b2de043aa4530dac01ed707c937e39a5031fa
-
SSDEEP
3072:kNJQxqHvWCfPe6ALkIHGac82tSZ+rRGDNpgpJXOq2//q3KV3yJuqkpQ7SLGl:SJHuC9ALNmI46+rRkmD2nhV3yJApQ7x
Malware Config
Signatures
Files
-
239179ba04c6c3bbe2d2f1d8f09df5dba31dcb768e19287527112c115f4c7165.dll windows x86
a20e4abda122ed0b99ee4cebddf6a2fc
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetShellWindow
GetMenuItemRect
GetMessageTime
GetKeyNameTextW
InvalidateRgn
EndPaint
MoveWindow
GetUpdateRgn
MapVirtualKeyExW
GrayStringW
GetMenuItemInfoW
ShowScrollBar
GetClassNameW
SetCursorPos
LoadMenuA
OpenInputDesktop
CharNextExA
SetSysColors
IsWindowEnabled
OffsetRect
MapVirtualKeyW
DrawFrameControl
GetNextDlgTabItem
CharLowerW
SetWindowPlacement
IsWindowVisible
GetKeyboardLayout
SendDlgItemMessageW
LoadStringW
LoadIconA
OpenIcon
CharPrevW
GetDCEx
DestroyIcon
CheckMenuItem
kernel32
LocalAlloc
GlobalLock
VirtualQuery
ConnectNamedPipe
CreateSemaphoreW
lstrcatW
GlobalFree
GetThreadPriority
IsDBCSLeadByteEx
GetCommConfig
ExitProcess
GetFullPathNameA
SetLastError
SetFileApisToOEM
GetBinaryTypeA
CopyFileA
GetModuleFileNameW
SetCommState
ExitThread
LocalFree
gdi32
CreateDiscardableBitmap
CreateBrushIndirect
GetRgnBox
GetROP2
AddFontResourceW
SetTextAlign
CreateFontIndirectW
SetROP2
ScaleWindowExtEx
EnumFontFamiliesExW
PolyBezier
GetWindowOrgEx
PtInRegion
StretchDIBits
PatBlt
msvcrt
_controlfp
__set_app_type
putc
iswspace
__p__fmode
__p__commode
_amsg_exit
time
_initterm
wcspbrk
_acmdln
exit
_ismbblead
strcpy
iswalpha
_XcptFilter
_exit
_cexit
strchr
__setusermatherr
swscanf
__getmainargs
wcsncmp
remove
advapi32
IsWellKnownSid
CreateWellKnownSid
Exports
Exports
Sections
.text Size: 172KB - Virtual size: 172KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.geo Size: 512B - Virtual size: 28B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.iod Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dbg Size: 512B - Virtual size: 101B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.top Size: 1024B - Virtual size: 860B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bott Size: 512B - Virtual size: 140B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ