Static task
static1
Behavioral task
behavioral1
Sample
b906a00325b51bd1e31ad44c392a163466e896963730e6aa2cc9ee4bd41ffe2f.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b906a00325b51bd1e31ad44c392a163466e896963730e6aa2cc9ee4bd41ffe2f.dll
Resource
win10v2004-20221111-en
General
-
Target
b906a00325b51bd1e31ad44c392a163466e896963730e6aa2cc9ee4bd41ffe2f
-
Size
838KB
-
MD5
60dcba2a6efb92eddef373ce9bf81870
-
SHA1
d01de6db7fbcb95cc5a02888a10915b52afc3a40
-
SHA256
b906a00325b51bd1e31ad44c392a163466e896963730e6aa2cc9ee4bd41ffe2f
-
SHA512
25103d1c7ddc354c0691f3a71307dd2d8e2ab4d1d99311d17d2e23d864918a95a83ff5bad200df45206652f5c48803a97b6bd2ab628851be096c33857ddd0a9a
-
SSDEEP
12288:OX4WdYJKX6fksj5YdwUVA8f7RikTY4rGwRge7U/6oOCWu39vkBskKAlXvWVlsvRT:GEs6fHlYru8ftikTlNRI/6D8yk/sR/O
Malware Config
Signatures
Files
-
b906a00325b51bd1e31ad44c392a163466e896963730e6aa2cc9ee4bd41ffe2f.dll windows x86
96cc4857fccf3e303b6fa8ab97b0aa88
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileType
SetHandleCount
SetEnvironmentVariableA
GetLastError
VirtualAlloc
GetWindowsDirectoryA
LockFile
SetFilePointer
UnlockFile
FileTimeToLocalFileTime
GlobalLock
FlushFileBuffers
IsDebuggerPresent
GetStartupInfoA
HeapCreate
WriteConsoleA
GetConsoleOutputCP
TlsSetValue
GlobalDeleteAtom
ConvertDefaultLocale
InterlockedDecrement
TlsAlloc
GlobalHandle
GetCommandLineW
TlsGetValue
GetCurrentThread
GetStringTypeA
GetLocaleInfoA
InterlockedExchange
VirtualFree
lstrcmpA
LocalFree
ReadFile
SizeofResource
GlobalFlags
UnhandledExceptionFilter
GetCurrentProcessId
LoadResource
FindClose
SetEndOfFile
LocalFileTimeToFileTime
WriteFile
RtlUnwind
VirtualQuery
LockResource
GetFileSize
GlobalReAlloc
LCMapStringA
InterlockedIncrement
SetLastError
GetStdHandle
CloseHandle
SetStdHandle
LocalReAlloc
GetVersion
GetConsoleCP
GetACP
GetModuleFileNameA
SetFileTime
HeapFree
FileTimeToSystemTime
TerminateProcess
SetUnhandledExceptionFilter
LocalAlloc
TlsFree
lstrlenA
HeapAlloc
RaiseException
EnterCriticalSection
HeapReAlloc
GetEnvironmentStrings
DeleteCriticalSection
EnumResourceLanguagesW
GetProcessHeap
GetSystemTimeAsFileTime
HeapDestroy
MulDiv
Sleep
HeapSize
SystemTimeToFileTime
FreeEnvironmentStringsA
CreateFileA
GetThreadLocale
InitializeCriticalSection
DuplicateHandle
CompareStringA
GetTimeZoneInformation
FreeResource
GetVersionExA
GetConsoleMode
GetCommandLineA
GetFileTime
GetSystemDirectoryA
SetErrorMode
GetSystemInfo
QueryPerformanceCounter
FreeLibrary
GetOEMCP
LeaveCriticalSection
GetCurrentThreadId
GetModuleHandleA
LoadLibraryA
GlobalFree
GetProcAddress
GlobalAlloc
GlobalUnlock
ExitProcess
user32
UpdateWindow
KillTimer
SetMenu
SetTimer
WindowFromPoint
GetForegroundWindow
GetMenu
SetScrollInfo
GetWindowRgn
ValidateRect
BringWindowToTop
SetCursor
SetCapture
InvalidateRgn
GetMenuItemCount
TranslateMessage
ScrollWindow
IsRectEmpty
TrackPopupMenu
GetKeyState
GetWindow
UnhookWindowsHookEx
MapDialogRect
GetMenuItemID
SetParent
GetDlgCtrlID
GetScrollRange
CallNextHookEx
AdjustWindowRectEx
GetCursorPos
GetNextDlgGroupItem
DeferWindowPos
GetNextDlgTabItem
GetSysColorBrush
SetWindowContextHelpId
ReleaseCapture
OffsetRect
ClientToScreen
ShowScrollBar
MapWindowPoints
IsZoomed
RedrawWindow
SetScrollPos
InvalidateRect
GetMessageTime
PostQuitMessage
GetFocus
MoveWindow
GetWindowPlacement
SetScrollRange
GetMenuState
EndPaint
GetWindowThreadProcessId
GetDCEx
MessageBeep
EqualRect
LockWindowUpdate
GetSysColor
IsChild
GetLastActivePopup
DrawIcon
SendDlgItemMessageA
GetSystemMenu
EnableMenuItem
InflateRect
SetWindowPos
PtInRect
GetDlgItem
SetWindowRgn
IsIconic
SystemParametersInfoA
GetActiveWindow
GetCapture
BeginPaint
DeleteMenu
SetFocus
GetMenuCheckMarkDimensions
IntersectRect
SetRectEmpty
DestroyIcon
ShowWindow
GetClientRect
CheckMenuItem
SetMenuItemBitmaps
IsWindowEnabled
ReleaseDC
GetWindowRect
SetActiveWindow
EndDialog
GetDesktopWindow
IsWindowVisible
EndDeferWindowPos
ReuseDDElParam
CharUpperA
GetDC
BeginDeferWindowPos
GetSystemMetrics
CopyRect
GetMessagePos
DestroyWindow
ScreenToClient
UnpackDDElParam
SetRect
GetTopWindow
ShowOwnedPopups
GetScrollPos
CreatePopupMenu
DestroyMenu
GetParent
GetSubMenu
IsWindow
FillRect
GetScrollInfo
SetForegroundWindow
UnregisterClassA
GetWindowDC
gdi32
GetDeviceCaps
ExtSelectClipRgn
GetClipBox
CreateCompatibleDC
SetBkColor
DPtoLP
GetTextColor
SetViewportExtEx
RectVisible
SetViewportOrgEx
ExcludeClipRect
Escape
SetRectRgn
SetWindowExtEx
CreateBitmap
OffsetRgn
CreateCompatibleBitmap
RestoreDC
ScaleViewportExtEx
BitBlt
CreatePatternBrush
SaveDC
ScaleWindowExtEx
PtVisible
CombineRgn
GetMapMode
SelectClipRgn
PatBlt
SetTextColor
GetPixel
CreateSolidBrush
CreateRectRgn
Ellipse
SetMapMode
StretchDIBits
IntersectClipRect
SelectObject
OffsetViewportOrgEx
CreateEllipticRgn
DeleteDC
GetStockObject
GetBkColor
GetWindowExtEx
CreateRectRgnIndirect
DeleteObject
GetRgnBox
SetBkMode
advapi32
SetFileSecurityW
RegCloseKey
shell32
DragFinish
ole32
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CreateStreamOnHGlobal
CoRegisterMessageFilter
CoFreeUnusedLibraries
OleFlushClipboard
StgOpenStorageOnILockBytes
CoRevokeClassObject
OleInitialize
CoGetClassObject
OleIsCurrentClipboard
OleUninitialize
CLSIDFromProgID
CoCreateInstance
CLSIDFromString
oleaut32
SysAllocStringLen
SysFreeString
SystemTimeToVariantTime
VariantTimeToSystemTime
VariantInit
VariantChangeType
OleLoadPicture
OleCreateFontIndirect
SysAllocString
VariantClear
SafeArrayDestroy
SysStringLen
VariantCopy
comctl32
ImageList_LoadImageW
shlwapi
PathRemoveExtensionW
PathIsUNCW
PathFindExtensionW
PathFindFileNameW
PathStripToRootW
PathFileExistsW
Sections
.text Size: 551KB - Virtual size: 550KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 263KB - Virtual size: 281KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ