Static task
static1
Behavioral task
behavioral1
Sample
e43eb3e3cf2c5ea762e278cafdc9f22dd83a560021831ca7d14be5974c40d4c8.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e43eb3e3cf2c5ea762e278cafdc9f22dd83a560021831ca7d14be5974c40d4c8.dll
Resource
win10v2004-20221111-en
General
-
Target
e43eb3e3cf2c5ea762e278cafdc9f22dd83a560021831ca7d14be5974c40d4c8
-
Size
126KB
-
MD5
f4edbc9b0ccc093d87b780697ef59bc3
-
SHA1
db9d90833b671fb21afd198da71674c3f0b22cca
-
SHA256
e43eb3e3cf2c5ea762e278cafdc9f22dd83a560021831ca7d14be5974c40d4c8
-
SHA512
ed4d4330163e7c6a2fcdfaf4f8020dddf3d5c7d63d0f1c9f99874cc1947b40d80b9ca76393b60816534ddb61a48cb126e64558ea58ed58d9aae90daea343349d
-
SSDEEP
3072:rCaXamQeLzqGv9gFL2xZvqLqYXWTexMqQ54hIY+hCU:rC4am9PqFL2KLPGT5qQ5aIY
Malware Config
Signatures
Files
-
e43eb3e3cf2c5ea762e278cafdc9f22dd83a560021831ca7d14be5974c40d4c8.dll windows x86
6625e1b8782edf4270d8c313671c7629
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
IsBadReadPtr
GetEnvironmentStringsW
GetEnvironmentStrings
TlsGetValue
WaitForSingleObject
GetCurrentThreadId
GetModuleHandleA
LCMapStringA
CreateFileMappingA
CreateFileA
InterlockedIncrement
UnmapViewOfFile
HeapFree
IsBadWritePtr
MapViewOfFile
GetLocaleInfoW
HeapAlloc
SetStdHandle
GetModuleFileNameA
CreateDirectoryA
CreateEventA
FreeEnvironmentStringsW
ExitProcess
SetHandleCount
IsBadCodePtr
CreateThread
GetSystemInfo
SizeofResource
GetTempPathA
DebugBreak
CreateProcessA
GetCurrentDirectoryA
GetStringTypeA
WriteFile
LeaveCriticalSection
ReadFile
ResetEvent
LockResource
InterlockedDecrement
CompareFileTime
MultiByteToWideChar
EnterCriticalSection
FreeEnvironmentStringsA
TerminateProcess
HeapCreate
FlushFileBuffers
LCMapStringW
DeleteFileA
SetUnhandledExceptionFilter
GetCurrentProcess
GetTimeFormatA
VirtualAlloc
GetLocaleInfoA
TlsAlloc
GetOEMCP
GetCPInfo
TlsFree
SetLastError
GetStringTypeW
TlsSetValue
HeapReAlloc
PulseEvent
GetDateFormatA
LoadResource
RtlUnwind
RemoveVectoredExceptionHandler
AddVectoredExceptionHandler
OutputDebugStringA
CopyFileA
FindFirstFileA
CloseHandle
GetACP
LoadLibraryA
GetLastError
VirtualQuery
VirtualProtect
GetCommandLineA
GetVersionExA
GetProcAddress
GetModuleHandleW
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
WideCharToMultiByte
HeapDestroy
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LoadLibraryExA
InitializeCriticalSection
Sleep
UnhandledExceptionFilter
gdi32
GetRandomRgn
advapi32
RegOpenKeyExA
RegDeleteKeyA
RegSetValueExA
RegCloseKey
ole32
CoTaskMemAlloc
CoCreateInstance
StringFromCLSID
OleUninitialize
OleInitialize
Sections
.text Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 71KB - Virtual size: 249KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 1008B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ