Static task
static1
Behavioral task
behavioral1
Sample
c54e3543041821bec73c98350a617f1c3586b24b924b18d0ae0720171cfac200.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c54e3543041821bec73c98350a617f1c3586b24b924b18d0ae0720171cfac200.dll
Resource
win10v2004-20221111-en
General
-
Target
c54e3543041821bec73c98350a617f1c3586b24b924b18d0ae0720171cfac200
-
Size
171KB
-
MD5
2dcc72e81da4e57a35deff7577ba8a40
-
SHA1
c167e6735d577c375c7da1eb1d4559bb0bc406a7
-
SHA256
c54e3543041821bec73c98350a617f1c3586b24b924b18d0ae0720171cfac200
-
SHA512
f59df3c34f59d696739f675c24ba9df00a39b67445bc7ea711c7977d037a5ccffd2f36a2993fee3e034ae8c8da625725f4d2e98d3f769d333b37eb2e192b142e
-
SSDEEP
3072:GfnkXwzDfAmlDUqkAzAs3Uwqj8ThksOlafBeYaAWllBTkc+6L+SrPuiIEMmOQpxz:GbTAiDUfmBqQq531AYujfSrP/q+pxG8m
Malware Config
Signatures
Files
-
c54e3543041821bec73c98350a617f1c3586b24b924b18d0ae0720171cfac200.dll windows x86
7661f076bb398c89d6dea58ffb3aeb9e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
WriteClassStm
CoTaskMemRealloc
StringFromCLSID
CoCreateInstanceEx
OleRegGetUserType
CoGetMalloc
ReadOleStg
CoTaskMemAlloc
CoCreateInstance
StgCreateDocfileOnILockBytes
CoMarshalInterThreadInterfaceInStream
CoMarshalInterface
GetHGlobalFromStream
CoGetObjectContext
ReleaseStgMedium
StringFromGUID2
OleLoadFromStream
CoRevokeClassObject
CreateILockBytesOnHGlobal
StringFromIID
OleRegEnumVerbs
OleSaveToStream
StgIsStorageFile
CoImpersonateClient
comdlg32
PrintDlgExW
FindTextA
CommDlgExtendedError
ChooseColorA
ChooseColorW
GetOpenFileNameW
PrintDlgA
GetSaveFileNameW
GetFileTitleA
FindTextW
comctl32
CreatePropertySheetPageW
ImageList_ReplaceIcon
user32
SetDlgItemTextA
GetWindowDC
UnregisterClassA
ReleaseDC
OffsetRect
RegisterClassA
DialogBoxParamA
GetMenuItemCount
GetMessageA
IsIconic
SystemParametersInfoW
IsChild
CharUpperA
CallNextHookEx
CreatePopupMenu
CheckDlgButton
IsWindow
LoadStringA
GetMenu
TranslateMessage
GetWindowPlacement
GetDlgItem
DrawFocusRect
GetWindowRect
DefWindowProcA
GetSystemMenu
GetWindowTextLengthW
wsprintfW
wsprintfA
msvcrt
wcslen
setlocale
_wcsupr
wcsstr
towlower
wcscat
atol
wcschr
fflush
wcsspn
_CIsqrt
_ultow
_adjust_fdiv
sprintf
wcstombs
__set_app_type
_vsnwprintf
wcsncat
_controlfp
fprintf
__p__commode
_stricmp
?terminate@@YAXXZ
wcstoul
isspace
atoi
_ltoa
rand
swprintf
fopen
__setusermatherr
fseek
_fileno
iswalpha
__p__fmode
__initenv
srand
kernel32
EnterCriticalSection
FreeEnvironmentStringsW
GetLocalTime
GetCurrentThread
CreateMutexW
GetCurrentThreadId
CreateProcessA
GetCPInfo
LockResource
ResetEvent
LoadResource
RtlUnwind
GetFileSize
CompareStringW
MultiByteToWideChar
MulDiv
GetConsoleMode
ExitProcess
CreateThread
WriteConsoleW
RemoveDirectoryW
lstrcmpA
GetSystemTime
UnmapViewOfFile
lstrcpynA
OutputDebugStringA
lstrlenW
GetCurrentProcessId
ReadFile
GlobalLock
VirtualAlloc
Sections
.text Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 144KB - Virtual size: 334KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 495B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ