Static task
static1
Behavioral task
behavioral1
Sample
a8ca3072ed00799a574d7f2ac9f0302846fcc6487fe9eb211f87ad01adac42ae.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a8ca3072ed00799a574d7f2ac9f0302846fcc6487fe9eb211f87ad01adac42ae.dll
Resource
win10v2004-20220812-en
General
-
Target
a8ca3072ed00799a574d7f2ac9f0302846fcc6487fe9eb211f87ad01adac42ae
-
Size
49KB
-
MD5
bac78e033be28fa96f9c0d31861ef742
-
SHA1
5fbd145c7c99d5b465bdde3acad93367e9106b18
-
SHA256
a8ca3072ed00799a574d7f2ac9f0302846fcc6487fe9eb211f87ad01adac42ae
-
SHA512
0510595d7dd4458a643e76789b9441984d2d7016085685c536fdbaa1e1506086ee77bfe60e70a67cd8586aeedfc355b5dadbc068494633d2d4daeec62c2dbe5b
-
SSDEEP
768:o+kucBFxjAECB9O+y+6lkmIYWITpSkB/zqdNszQ04+Sl2RCVKMBdFoEtGxi9RENs:MAOavGqV0vSERgKgoEIxMRE0RBssAZwH
Malware Config
Signatures
Files
-
a8ca3072ed00799a574d7f2ac9f0302846fcc6487fe9eb211f87ad01adac42ae.dll windows x86
6ef2650c7c8d5d72d5f8036d347d4f92
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedExchangeAdd
GetProcAddress
GetStartupInfoA
VirtualAlloc
InterlockedExchange
VirtualQuery
DosDateTimeToFileTime
GetTickCount
InterlockedDecrement
InterlockedIncrement
LoadLibraryA
GetVersionExA
Sleep
QueryPerformanceCounter
QueryPerformanceFrequency
GetLastError
IsBadStringPtrA
GetComputerNameA
VirtualProtect
user32
GetWindowThreadProcessId
GetWindow
GetIconInfo
IsClipboardFormatAvailable
GetCursor
IsWindowUnicode
GetWindowTextA
IsCharUpperA
GetTopWindow
IsZoomed
IsIconic
GetGUIThreadInfo
GetParent
IsChild
IsMenu
GetWindowRgn
IsCharAlphaA
GetWindowDC
advapi32
InitializeSecurityDescriptor
GetUserNameA
RevertToSelf
msvcrt
_CIcosh
_CIacos
srand
_adjust_fdiv
malloc
_initterm
free
_memicmp
_memccpy
time
modf
floor
localeconv
_hypot
_pctype
_isctype
__mb_cur_max
ldexp
_errno
div
rand
_set_error_mode
_CIpow
_ultoa
gdi32
GetStretchBltMode
GetROP2
GetBkColor
GetBkMode
GetBitmapDimensionEx
GdiGetBatchLimit
ole32
CoFileTimeNow
CoGetCurrentProcess
shell32
DuplicateIcon
ord64
Sections
.text Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 70KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ