Static task
static1
Behavioral task
behavioral1
Sample
a4b4aaf1553ecf3cd062b770722df04b802289ac37e72465b77b6fea00171499.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a4b4aaf1553ecf3cd062b770722df04b802289ac37e72465b77b6fea00171499.dll
Resource
win10v2004-20221111-en
General
-
Target
a4b4aaf1553ecf3cd062b770722df04b802289ac37e72465b77b6fea00171499
-
Size
6KB
-
MD5
3fef55a5aa04c98d718487b55b737440
-
SHA1
bf4635356afdb3be2bccb65cbcedac6f1950cf4d
-
SHA256
a4b4aaf1553ecf3cd062b770722df04b802289ac37e72465b77b6fea00171499
-
SHA512
b5c539dc8e5233c974573ecaed000fe1f441fcccb1d46ab91ba36c0f1a94d70afa97bce1b50e5930b07c30d16fc0d8d4c5a05535fa34bb14b4d4accb7789a160
-
SSDEEP
48:6nR6wSHGHHSlyviPdYS194nq9JZuvULx5LgctLd/NVGpuNJdtAM862x1h2syBI4G:qRNWRYcyQgcf/6puNJrh2gLI
Malware Config
Signatures
Files
-
a4b4aaf1553ecf3cd062b770722df04b802289ac37e72465b77b6fea00171499.dll windows x86
5fe3bdd2985c6f0f617cef2292121dff
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
CloseHandle
CreateFileA
CreateThread
DeleteFileA
ExitThread
GetTempPathA
GlobalAlloc
SetFileAttributesA
WriteFile
msvcrt
__dllonexit
_errno
atoi
fflush
free
malloc
memset
strcat
strlen
shell32
ShellExecuteA
wininet
HttpQueryInfoA
InternetCloseHandle
InternetOpenA
InternetOpenUrlA
InternetReadFile
InternetSetOptionA
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 64B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 96B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1024B - Virtual size: 908B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ