?SKIDROW@@YAXXZ
Static task
static1
Behavioral task
behavioral1
Sample
76a4ae60717c0e321336fe11105487df728e99f7584b7470a0c54a3bb3c99cf4.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
76a4ae60717c0e321336fe11105487df728e99f7584b7470a0c54a3bb3c99cf4.dll
Resource
win10v2004-20221111-en
General
-
Target
76a4ae60717c0e321336fe11105487df728e99f7584b7470a0c54a3bb3c99cf4
-
Size
102KB
-
MD5
47ca3acf1a2e59d03b93074b46ed34d3
-
SHA1
6d1d65a6a0e218df535f7a7c36d5e95d66e12e25
-
SHA256
76a4ae60717c0e321336fe11105487df728e99f7584b7470a0c54a3bb3c99cf4
-
SHA512
25fd193ae3e86eaa535ad0251ff69a0585a89e04ed02df55041b8414e90e1be2ab7c53efc8d5043009601c2d80ec1124b07554b60eef76c431fa5cb9a2e30a4f
-
SSDEEP
3072:2s4Sq9H6WWsAQJeD8euBhhS+iTC4tFwrNuP2q1:2aiaW4QJe4zhS+iTHFuAv
Malware Config
Signatures
Files
-
76a4ae60717c0e321336fe11105487df728e99f7584b7470a0c54a3bb3c99cf4.dll windows x86
0a2e5d6ce26bb4b53d8fc862eef12433
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
OpenProcessToken
kernel32
ExitProcess
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
Exports
Exports
Sections
.text Size: - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.skr0 Size: - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.skr1 Size: - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
.skr2 Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 152B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ