Static task
static1
Behavioral task
behavioral1
Sample
e3f5f5c9f4c3a25b90854cace7ee5ad0f6dc2816f3abc08e1c9b460a8cbe3e97.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e3f5f5c9f4c3a25b90854cace7ee5ad0f6dc2816f3abc08e1c9b460a8cbe3e97.dll
Resource
win10v2004-20221111-en
General
-
Target
e3f5f5c9f4c3a25b90854cace7ee5ad0f6dc2816f3abc08e1c9b460a8cbe3e97
-
Size
177KB
-
MD5
a447e49f257ee74bf94ea9066484259b
-
SHA1
0f3e697cdd67df07fd0a90acfb6b60276a0321cf
-
SHA256
e3f5f5c9f4c3a25b90854cace7ee5ad0f6dc2816f3abc08e1c9b460a8cbe3e97
-
SHA512
333bcf234babc29775aecc38d731c1fede77e82e56b9f5f2cd9af394d70369e40d23e1a474192984f61136de705031cf8cde63692f89186afe4ea4039f751960
-
SSDEEP
3072:HaW7ZYKgMr/fC/BPaLGMYsoHjjR8mUtynoUqN/bPbJL088NZQo++ghYZoJnBze:fFYKgO6kesoHJGGU9bbl0Z0Ppe
Malware Config
Signatures
Files
-
e3f5f5c9f4c3a25b90854cace7ee5ad0f6dc2816f3abc08e1c9b460a8cbe3e97.dll windows x86
f4fea18c5ea14835d3dd64712260b618
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
GetVersionExW
GetThreadLocale
GetLocaleInfoA
GetACP
LoadLibraryA
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetModuleHandleA
lstrlenW
GetEnvironmentVariableA
InterlockedExchange
RaiseException
WideCharToMultiByte
MultiByteToWideChar
CreateProcessA
lstrlenA
GetSystemTimeAsFileTime
GetCurrentProcessId
rpcrt4
RpcStringBindingComposeW
RpcStringFreeW
RpcBindingFromStringBindingW
UuidCreate
shell32
ShellExecuteExW
ord201
SHGetPathFromIDListW
ShellExecuteW
SHGetSpecialFolderPathA
Sections
.text Size: 90KB - Virtual size: 90KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 976B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 84KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 68B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ