_???������3��D��
Behavioral task
behavioral1
Sample
8bd6c471fba43afe60fc62cb134c4c51dc26820f7a62c16d467bd6ef87fdfc55.dll
Resource
win7-20221111-en
General
-
Target
8bd6c471fba43afe60fc62cb134c4c51dc26820f7a62c16d467bd6ef87fdfc55
-
Size
964KB
-
MD5
9fd5378ef90b75070cf1e341bbdabeb0
-
SHA1
3a24261505b9c6f485251eb277607c570abae9e7
-
SHA256
8bd6c471fba43afe60fc62cb134c4c51dc26820f7a62c16d467bd6ef87fdfc55
-
SHA512
665e79eb5a80530bfdb70b6640c314e6ab625137e1ce1cd37f31320b77caef08f17abbe0347a1b3a45fb816221fab6891e3726f54943ef9df20c35ca137c06f2
-
SSDEEP
24576:TKdvshbu9oJntJv+UQ++dsO7/yj+a2IXz6n+GlJH5A:TS+1TQldC+alX2+GlZ
Malware Config
Signatures
Files
-
8bd6c471fba43afe60fc62cb134c4c51dc26820f7a62c16d467bd6ef87fdfc55.dll windows x86
4ccc67acfc75c9acc77d1b759deec1a5
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetUnhandledExceptionFilter
RtlMoveMemory
GetCurrentThread
GetModuleHandleA
VirtualProtect
GetCurrentProcess
CreateFileA
WideCharToMultiByte
Process32First
Process32Next
CreateWaitableTimerA
SetWaitableTimer
MultiByteToWideChar
Thread32First
Thread32Next
OpenThread
TerminateThread
ResumeThread
GetCurrentThreadId
GetProcessHeap
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
IsBadReadPtr
GetModuleFileNameA
FreeLibrary
DeleteFileA
SetFileAttributesA
MoveFileA
GetPrivateProfileStringA
GetLocalTime
GetCommandLineA
LoadLibraryA
LCMapStringA
GetVersionExA
DeviceIoControl
GetProcAddress
LoadLibraryExA
OpenProcess
CloseHandle
FlushFileBuffers
SetStdHandle
IsBadCodePtr
Module32First
GetFileAttributesA
CreateToolhelp32Snapshot
GetStringTypeW
GetStringTypeA
GetOEMCP
GetACP
GetTempPathA
GetSystemDirectoryA
GetWindowsDirectoryA
GetLastError
CreateThread
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetVersion
RtlUnwind
InterlockedDecrement
InterlockedIncrement
TerminateProcess
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
WriteFile
RaiseException
VirtualAlloc
SetFilePointer
LCMapStringW
GetCPInfo
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
KillTimer
CallWindowProcA
SetWindowLongA
RegisterHotKey
UnregisterHotKey
MsgWaitForMultipleObjects
GetWindowTextA
SetTimer
GetClassNameA
GetWindowThreadProcessId
GetWindow
GetDesktopWindow
MessageBoxA
wsprintfA
DispatchMessageA
TranslateMessage
GetMessageA
PeekMessageA
psapi
GetMappedFileNameA
shlwapi
PathFileExistsA
shell32
SHGetSpecialFolderPathA
Exports
Exports
Sections
.text Size: 108KB - Virtual size: 106KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 120KB - Virtual size: 118KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: 288KB - Virtual size: 287KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 428KB - Virtual size: 425KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 184B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ