ujdxajfo
Static task
static1
Behavioral task
behavioral1
Sample
dae79313f6d75dd6ed767119753630bf7614e4fca8ddb53638f6287a11e21c4a.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
dae79313f6d75dd6ed767119753630bf7614e4fca8ddb53638f6287a11e21c4a.dll
Resource
win10v2004-20220812-en
General
-
Target
dae79313f6d75dd6ed767119753630bf7614e4fca8ddb53638f6287a11e21c4a
-
Size
112KB
-
MD5
f1db55720a7e2b71bdf0c56b9e2978b0
-
SHA1
9828500ad107bb5c1cfabc23f7697ddf46c60c1f
-
SHA256
dae79313f6d75dd6ed767119753630bf7614e4fca8ddb53638f6287a11e21c4a
-
SHA512
11ea1f677d8521a5408134020625106236b2ead4755f40f61d6bbc5164c373830f7c2514eda962b72cc74c5d0a947a2a2a47ee2b0c6d5d27ba9bb52db61c6371
-
SSDEEP
3072:LipXXTiT3IESioi2wsSkooHEe0XWrXD3o2sedpm:W1TkPl2w82mTc2sed
Malware Config
Signatures
Files
-
dae79313f6d75dd6ed767119753630bf7614e4fca8ddb53638f6287a11e21c4a.dll windows x86
15bec98a33a7676ef8be6455a50dad8f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
AllocateAndInitializeSid
GetSecurityDescriptorControl
RegDeleteValueA
FreeSid
EqualSid
CloseServiceHandle
RegSetValueExA
RegOpenKeyExA
RegQueryInfoKeyA
LockServiceDatabase
ChangeServiceConfigA
LookupAccountSidW
RegEnumValueA
RegQueryValueExA
RegCreateKeyExA
RegFlushKey
version
VerQueryValueA
GetFileVersionInfoA
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeA
kernel32
RtlUnwind
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
SetFilePointer
GetHandleInformation
GetProcAddress
GetModuleHandleA
IsValidLocale
LoadLibraryA
VirtualAlloc
lstrcmpiA
QueryPerformanceCounter
CloseHandle
SetEndOfFile
SetCurrentDirectoryW
GlobalAlloc
SetStdHandle
ResumeThread
LoadResource
GetTempFileNameA
FindResourceA
CreateFileMappingA
DeleteCriticalSection
GetVersionExW
ReleaseMutex
SystemTimeToFileTime
ReadFile
GetSystemInfo
GetCurrentDirectoryA
InterlockedDecrement
FileTimeToLocalFileTime
GetConsoleMode
InterlockedIncrement
LockResource
ExitThread
ExitProcess
FindResourceW
ResetEvent
GetLastError
WriteConsoleW
lstrcpyA
GetFileTime
CreateMutexA
SearchPathW
IsValidCodePage
CreateEventW
WideCharToMultiByte
SetCurrentDirectoryA
lstrcpyW
GetCurrentThreadId
GetStdHandle
LCMapStringA
GlobalReAlloc
GetTempFileNameW
lstrcatA
VirtualFree
CreateDirectoryA
GlobalHandle
IsBadWritePtr
GetSystemTime
HeapAlloc
GetCommandLineA
GetVersion
HeapDestroy
HeapCreate
HeapFree
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
FatalAppExitA
HeapReAlloc
TerminateProcess
GetCurrentProcess
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetCurrentThread
SetHandleCount
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
WriteFile
CreateFileA
UnhandledExceptionFilter
GetCPInfo
GetACP
GetOEMCP
FlushFileBuffers
Exports
Exports
Sections
.text Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 52KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ