VisibleEntry
Static task
static1
Behavioral task
behavioral1
Sample
5211ad84270862e68026ce8e6c15c1f8499551e19d2967c349b46d3f8cfcdcaa.bin.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5211ad84270862e68026ce8e6c15c1f8499551e19d2967c349b46d3f8cfcdcaa.bin.dll
Resource
win10v2004-20221111-en
General
-
Target
5211ad84270862e68026ce8e6c15c1f8499551e19d2967c349b46d3f8cfcdcaa.bin.dll
-
Size
850KB
-
MD5
4c54bec464ba0c2b9d522643e1b3ebe7
-
SHA1
db497b95c79e41212577db0ba06777b62db209ff
-
SHA256
5211ad84270862e68026ce8e6c15c1f8499551e19d2967c349b46d3f8cfcdcaa
-
SHA512
ca9487b37a4163fba13442b6ffa728730cbb67f6b4dc8d6cf8ea8f3ae8099a3aab811cbcadc5e0c24511cf9670664bebd3b9da2fc98566f3a0279c50577ec763
-
SSDEEP
24576:0Y/KwH785Qjo2tkYvEEGuzTWu523YxcAf:7/785Qjo2ZGuzTWI23IcAf
Malware Config
Signatures
Files
-
5211ad84270862e68026ce8e6c15c1f8499551e19d2967c349b46d3f8cfcdcaa.bin.dll.dll windows x86
e6d7144b5be0aafc78ec7bcd50d0a643
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
CreateMutexW
OpenMutexW
CreateProcessA
GetTickCount
GetModuleFileNameW
lstrcmpW
FindFirstVolumeW
FindNextVolumeW
FindVolumeClose
GetVolumeInformationW
GetVolumePathNamesForVolumeNameW
CreateFileW
GetTempPathW
CloseHandle
GetFileSizeEx
ReadFile
WaitForSingleObject
CreateThread
MoveFileW
SetLastError
QueryPerformanceCounter
QueryPerformanceFrequency
SetEndOfFile
WriteConsoleW
SetStdHandle
GetFileAttributesW
FindNextFileW
FindFirstFileW
WriteFile
FindClose
GetProcessHeap
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
WaitForSingleObjectEx
Sleep
GetCurrentThreadId
GetNativeSystemInfo
InitializeSRWLock
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
TryEnterCriticalSection
DeleteCriticalSection
WideCharToMultiByte
MultiByteToWideChar
GetSystemTimeAsFileTime
GetModuleHandleW
GetProcAddress
EncodePointer
DecodePointer
LCMapStringEx
GetLocaleInfoEx
GetStringTypeW
CompareStringEx
GetCPInfo
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
CreateEventW
InitializeSListHead
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetCurrentProcessId
GetCurrentProcess
TerminateProcess
RaiseException
RtlUnwind
InterlockedPushEntrySList
InterlockedFlushSList
VirtualQuery
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetCommandLineA
GetCommandLineW
HeapAlloc
HeapFree
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetStdHandle
GetFileType
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
SetFilePointerEx
ReadConsoleW
HeapReAlloc
HeapSize
GetTimeZoneInformation
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
shell32
SHChangeNotify
advapi32
RegSetValueExW
RegCreateKeyExW
bcrypt
BCryptOpenAlgorithmProvider
BCryptCloseAlgorithmProvider
BCryptGenRandom
Exports
Exports
Sections
.text Size: 635KB - Virtual size: 635KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 144KB - Virtual size: 143KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 34KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ