uCXDbrWHoKOicXLf
Static task
static1
Behavioral task
behavioral1
Sample
ed5adaf0adbed8e83736418f6a3452233c7847ccb367dcb52ef6ec3e5ae17c71.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ed5adaf0adbed8e83736418f6a3452233c7847ccb367dcb52ef6ec3e5ae17c71.dll
Resource
win10v2004-20220901-en
General
-
Target
ed5adaf0adbed8e83736418f6a3452233c7847ccb367dcb52ef6ec3e5ae17c71
-
Size
107KB
-
MD5
aa4cb1b5dd3c78801ce7dd689e466a0d
-
SHA1
6b66bfa9946b599870562752c10c6eb17321c192
-
SHA256
ed5adaf0adbed8e83736418f6a3452233c7847ccb367dcb52ef6ec3e5ae17c71
-
SHA512
1d04f48cc8df854788425d93bc4784577199ce6b98f89b9057857af772010d279f5289e32d613796541f5ab55ad202327e571abcea5509a0f79791a8f7c893ae
-
SSDEEP
3072:+xQb6+fI6q6MmKGQ/e/8hzRDdlU55PFAO:hbLgYBB8hz9d0dF
Malware Config
Signatures
Files
-
ed5adaf0adbed8e83736418f6a3452233c7847ccb367dcb52ef6ec3e5ae17c71.dll windows x86
ae1436e6ef754546f46b7ca98422289e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedCompareExchange
GetTimeZoneInformation
CreateThread
EnumResourceTypesW
VirtualAlloc
CreateProcessW
EnumDateFormatsExW
SetSystemTime
WritePrivateProfileSectionA
GlobalCompact
WaitForDebugEvent
GetCurrentProcessId
SetLocaleInfoW
FindResourceA
OpenSemaphoreW
DosDateTimeToFileTime
CreateRemoteThread
GetDriveTypeW
GetWriteWatch
lstrcpyA
ReadFileEx
LocalReAlloc
EnumCalendarInfoA
GetWindowsDirectoryA
HeapDestroy
WriteConsoleW
FoldStringA
IsDebuggerPresent
FileTimeToSystemTime
GetStringTypeW
GetProcessIoCounters
SwitchToThread
RequestDeviceWakeup
GetProfileSectionW
WriteConsoleOutputCharacterW
GetComputerNameW
HeapAlloc
FindFirstChangeNotificationA
GetFileAttributesA
GetCalendarInfoW
SetProcessPriorityBoost
GetEnvironmentVariableW
AssignProcessToJobObject
ntdll
tolower
msvcrt
puts
putchar
printf
Exports
Exports
Sections
.text Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
hdata Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 452B - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ