Static task
static1
Behavioral task
behavioral1
Sample
d7ef2f14a36041a58e91e2dc66539f1e2250af6c3c2f6f62c539c193f6262953.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d7ef2f14a36041a58e91e2dc66539f1e2250af6c3c2f6f62c539c193f6262953.dll
Resource
win10v2004-20220901-en
General
-
Target
d7ef2f14a36041a58e91e2dc66539f1e2250af6c3c2f6f62c539c193f6262953
-
Size
160KB
-
MD5
13ab8a1c23b7946690631ac1fb667b51
-
SHA1
b7174cc234dc1bfb1ef05cbf73d5cec6d73ae16d
-
SHA256
d7ef2f14a36041a58e91e2dc66539f1e2250af6c3c2f6f62c539c193f6262953
-
SHA512
b16494274339716cfcca2fbed425e66fad516478a0acd39b69533c8ba7aed8176854c072731a83b818e0ac616919729c487cde09469f26100445c0bd41849cfa
-
SSDEEP
3072:kYpAxlaoK3MILMtZlEj1HAmsmI8nYgD5L5sbAnk2b6f:kYpOAtcILMtojtAcn/5L5nXb
Malware Config
Signatures
Files
-
d7ef2f14a36041a58e91e2dc66539f1e2250af6c3c2f6f62c539c193f6262953.dll windows x86
f80321d790b7f7f400d7362106ef9541
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
QueryPerformanceCounter
GetLastError
GetModuleFileNameW
CreateMailslotA
CloseHandle
SetEvent
lstrlenW
GetDriveTypeW
GetLogicalDrives
lstrcmpW
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
Sleep
ExitProcess
InitializeCriticalSection
GetCommandLineW
GetTickCount
ReleaseMutex
ResetEvent
WaitForMultipleObjectsEx
SetErrorMode
CreateEventW
CreateMutexW
CreateProcessW
MoveFileExW
GetSystemInfo
CreateFileA
ReadFile
SetFilePointer
DosDateTimeToFileTime
MultiByteToWideChar
FreeLibrary
GetProcAddress
LoadLibraryW
WideCharToMultiByte
CreateFileW
ReleaseSemaphore
WaitForSingleObject
WaitForMultipleObjects
CreateThread
CreateSemaphoreW
VirtualFree
VirtualAlloc
SetFilePointerEx
GetSystemTimeAsFileTime
CompareStringW
ExpandEnvironmentStringsW
SystemTimeToFileTime
GetSystemTime
SetFileTime
SetEndOfFile
WriteFile
LocalFree
lstrlenA
SystemTimeToTzSpecificLocalTime
GetTimeZoneInformation
GetFileSizeEx
FindClose
FindFirstFileW
GetFileAttributesW
CreateDirectoryW
GetTempPathW
GlobalFree
GlobalAlloc
GetFileAttributesExW
CopyFileW
CreateHardLinkW
SetFileAttributesW
DeleteFileW
GetTempPathA
GetFileTime
FindNextFileW
GetStdHandle
GetCurrentThread
RemoveDirectoryW
FormatMessageA
GetComputerNameW
GetCommandLineA
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
GetStartupInfoA
GetModuleHandleA
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapDestroy
HeapCreate
QueryPerformanceCounter
GetCurrentProcessId
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
GetCPInfo
GetACP
GetOEMCP
LCMapStringA
LCMapStringW
LoadLibraryA
HeapReAlloc
RtlUnwind
GetLocaleInfoA
HeapSize
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
FlushFileBuffers
user32
CharToOemA
OemToCharBuffA
advapi32
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
oleaut32
GetActiveObject
SafeArraySetRecordInfo
SafeArrayGetLBound
VariantInit
Sections
.text Size: 122KB - Virtual size: 121KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 310B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ