Static task
static1
Behavioral task
behavioral1
Sample
6980804a54a4559415c9b5c25bbc61fe0b95ea7d54901f4b0ddd423a266285f1.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
6980804a54a4559415c9b5c25bbc61fe0b95ea7d54901f4b0ddd423a266285f1.dll
Resource
win10v2004-20221111-en
General
-
Target
6980804a54a4559415c9b5c25bbc61fe0b95ea7d54901f4b0ddd423a266285f1
-
Size
233KB
-
MD5
4c4ead4588f989120376f3c9d9abce57
-
SHA1
800aab507b0d94e3628d23a3e0543c94ffc65fd8
-
SHA256
6980804a54a4559415c9b5c25bbc61fe0b95ea7d54901f4b0ddd423a266285f1
-
SHA512
a398a5d4eae94cda6e0b167d341d7821627933eaced9e5f9ea38b2b2c807705a310faffd4e8856dcbce4a85a6cd21f6d4663ed9fa8699f53920f89e1692dc20c
-
SSDEEP
6144:AX3/gc14bnDLiqx4HYkwoqjEgCCdGMUvvbC5oL:AX3/d14bnDeq0Y9VEgFd2nbC5oL
Malware Config
Signatures
Files
-
6980804a54a4559415c9b5c25bbc61fe0b95ea7d54901f4b0ddd423a266285f1.dll windows x86
5f43adca85b2d6bfe736cf146748e6f0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDiskFreeSpaceA
Sleep
lstrlenW
FindClose
GetSystemDefaultLangID
GetModuleHandleA
GetOEMCP
GetACP
VirtualQuery
GetCurrentThread
SetThreadLocale
IsBadReadPtr
GetStartupInfoA
LocalReAlloc
SetErrorMode
WideCharToMultiByte
HeapDestroy
WaitForSingleObject
GetProcAddress
WriteFile
ExitThread
LoadLibraryA
SizeofResource
GetStringTypeW
GetCommandLineA
EnterCriticalSection
ExitProcess
GetProcessHeap
GetCurrentThreadId
GetCommandLineW
DeleteFileA
LocalAlloc
lstrlenA
FindResourceA
GetVersionExA
GetModuleHandleW
GlobalFindAtomA
lstrcmpA
GetLastError
CreateThread
GetFileSize
VirtualAllocEx
GlobalDeleteAtom
IsBadHugeReadPtr
GlobalAddAtomA
GetTickCount
RaiseException
SetEvent
GetStringTypeA
GetLocaleInfoA
LockResource
SetLastError
GetUserDefaultLCID
EnumCalendarInfoA
HeapAlloc
lstrcatA
GetModuleFileNameA
ResetEvent
LoadLibraryExA
lstrcpynA
FormatMessageA
GlobalAlloc
shell32
Shell_NotifyIconA
SHFileOperationA
SHGetFileInfoA
SHGetDiskFreeSpaceA
DragQueryFileA
oleaut32
SysFreeString
SafeArrayCreate
shlwapi
SHDeleteKeyA
SHQueryInfoKeyA
PathGetCharTypeA
SHDeleteValueA
SHQueryValueExA
PathFileExistsA
SHStrDupA
msvcrt
atol
sin
memset
sqrt
fabs
user32
TrackPopupMenu
SetForegroundWindow
SetTimer
SetWindowLongA
SetParent
SetWindowsHookExA
SetClipboardData
SetCapture
ShowScrollBar
SetScrollRange
SetPropA
SetWindowPlacement
TranslateMessage
TranslateMDISysAccel
SetMenu
SetWindowPos
SetClassLongA
SetScrollInfo
SystemParametersInfoA
SetRect
SetMenuItemInfoA
SetCursor
SetWindowLongW
SetFocus
ShowWindow
SetWindowTextA
UnregisterClassA
SetScrollPos
ShowOwnedPopups
UnhookWindowsHookEx
Sections
.text Size: 53KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.fdata Size: 512B - Virtual size: 298B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.adata Size: 162KB - Virtual size: 281KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ddata Size: 1024B - Virtual size: 853B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 884B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ