Static task
static1
Behavioral task
behavioral1
Sample
ca4577621120487be492fc5664d75efa88bd1cea1a823bd2cdbd55cf41eab63d.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ca4577621120487be492fc5664d75efa88bd1cea1a823bd2cdbd55cf41eab63d.dll
Resource
win10v2004-20220812-en
General
-
Target
ca4577621120487be492fc5664d75efa88bd1cea1a823bd2cdbd55cf41eab63d
-
Size
239KB
-
MD5
32f71b065935690322524e612c50e448
-
SHA1
40e2e9cbea7eacd85fc5d5c9e341c465c39e9d00
-
SHA256
ca4577621120487be492fc5664d75efa88bd1cea1a823bd2cdbd55cf41eab63d
-
SHA512
ec48cbff2ae15c18b913d38b4bd1bce82a3f56ea13ec52a18f39afd842e42ee91b24372f49a381e4a05e123a805106ba1786e9365cb11f13aba20e4eb3f872a5
-
SSDEEP
6144:z4rV4qpw1FUIqUYkXhi3CAgHNcLBFj/s3G:z4R4qpWFhqZkRi31Nb
Malware Config
Signatures
Files
-
ca4577621120487be492fc5664d75efa88bd1cea1a823bd2cdbd55cf41eab63d.dll windows x86
c9e01342769735c9948e13f1db13e83c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
CopyEnhMetaFileA
GetDIBColorTable
GetDCOrgEx
SetPixel
shell32
SHFileOperationA
SHGetDesktopFolder
SHGetFolderPathA
SHGetFileInfoA
SHGetDesktopFolder
SHFileOperationA
SHGetSpecialFolderLocation
comdlg32
GetOpenFileNameA
ChooseColorA
ChooseColorA
FindTextA
GetFileTitleA
GetOpenFileNameA
GetSaveFileNameA
ChooseColorA
ChooseColorA
FindTextA
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
msvcrt
exit
comctl32
ImageList_Destroy
ImageList_Remove
ImageList_Add
ImageList_DragShowNolock
ImageList_Read
ImageList_DrawEx
ImageList_Draw
ImageList_Write
ImageList_GetBkColor
ImageList_GetBkColor
ImageList_Write
user32
GetWindowLongA
TranslateMessage
GetLastActivePopup
SetWindowPlacement
RemovePropA
EnableMenuItem
kernel32
VirtualAlloc
GetCurrentProcessId
GetProcAddress
LoadLibraryA
ExitThread
GetACP
GetModuleHandleA
GetVersionExA
IsBadHugeReadPtr
IsBadReadPtr
GetLastError
ExitProcess
GlobalAlloc
LocalAlloc
VirtualAllocEx
LoadLibraryExA
ole32
CoUninitialize
CreateStreamOnHGlobal
CoDisconnectObject
CoRevokeClassObject
StringFromIID
CoGetMalloc
CoCreateInstanceEx
advapi32
RegEnumKeyExA
RegLoadKeyA
RegQueryValueExA
oleaut32
SafeArrayCreate
RegisterTypeLib
SafeArrayUnaccessData
SysFreeString
SysReAllocStringLen
SysAllocStringLen
shlwapi
SHEnumValueA
SHQueryInfoKeyA
SHSetValueA
SHDeleteValueA
SHQueryValueExA
Sections
CODE Size: 63KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.DATA3 Size: 1024B - Virtual size: 963B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.DATA8 Size: 151KB - Virtual size: 151KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.DATA4 Size: 14KB - Virtual size: 149KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.DATA0 Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ